Skip to content

Commit b9fc3d5

Browse files
authored
Merge pull request #228382 from JnHs/jh-arck8-rbacrestructure
restructure access and identity content
2 parents 01c7d51 + e46a11b commit b9fc3d5

File tree

3 files changed

+55
-11
lines changed

3 files changed

+55
-11
lines changed

articles/azure-arc/kubernetes/conceptual-cluster-connect.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: "Access Azure Arc-enabled Kubernetes clusters from anywhere using cluster connect"
2+
title: "Cluster connect access to Azure Arc-enabled Kubernetes clusters"
33
ms.date: 07/22/2022
44
ms.topic: conceptual
55
description: "Cluster connect allows developers to access their Azure Arc-enabled Kubernetes clusters from anywhere for interactive development and debugging."
66
---
77

8-
# Access Azure Arc-enabled Kubernetes clusters from anywhere using cluster connect
8+
# Cluster connect access to Azure Arc-enabled Kubernetes clusters
99

1010
The Azure Arc-enabled Kubernetes *cluster connect* feature provides connectivity to the `apiserver` of the cluster without requiring any inbound port to be enabled on the firewall. A reverse proxy agent running on the cluster can securely start a session with the Azure Arc service in an outbound manner.
1111

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
title: "Azure Arc-enabled Kubernetes identity and access overview"
3+
ms.date: 02/28/2023
4+
ms.topic: conceptual
5+
description: "Understand identity and access options for Arc-enabled Kubernetes clusters."
6+
---
7+
8+
# Azure Arc-enabled Kubernetes identity and access overview
9+
10+
You can authenticate, authorize, and control access to your Azure Arc-enabled Kubernetes clusters. Kubernetes role-based access control (Kubernetes RBAC) lets you grant users, groups, and service accounts access to only the resources they need. You can further enhance the security and permissions structure by using Azure Active Directory and Azure role-based access control (RBAC).
11+
12+
While Kubernetes RBAC works only on Kubernetes resources within your cluster, Azure RBAC works on resources across your Azure subscription.
13+
14+
This topic provides an overview of these two RBAC systems and how you can use them with your Arc-enabled Kubernetes clusters.
15+
16+
## Kubernetes RBAC
17+
18+
[Kubernetes RBAC](https://kubernetes.io/docs/reference/access-authn-authz/rbac/) provides granular filtering of user actions. With Kubernetes RBAC, You assign users or groups permission to create and modify resources or view logs from running application workloads. You can create roles to define permissions, and then assign those roles to users with role bindings. Permissions may be scoped to a single namespace or across the entire cluster.
19+
20+
The Azure Arc-enabled Kubernetes cluster connect feature uses Kubernetes RBAC to provide connectivity to the `apiserver` of the cluster. This connectivity doesn't require any inbound port to be enabled on the firewall. A reverse proxy agent running on the cluster can securely start a session with the Azure Arc service in an outbound manner. Using the cluster connect feature helps enable interactive debugging and troubleshooting scenarios. It can also be used to provide cluster access to Azure services for [custom locations](conceptual-custom-locations.md).
21+
22+
For more information, see [Cluster connect access to Azure Arc-enabled Kubernetes clusters](conceptual-cluster-connect.md) and [Use cluster connect to securely connect to Azure Arc-enabled Kubernetes clusters](cluster-connect.md).
23+
24+
## Azure RBAC
25+
26+
[Azure role-based access control (RBAC)](/azure/role-based-access-control/overview) is an authorization system built on Azure Resource Manager and Azure Active Directory (Azure AD) that provides fine-grained access management of Azure resources.
27+
28+
With Azure RBAC, role definitions outline the permissions to be applied. You assign these roles to users or groups via a role assignment for a particular scope. The scope can be across the entire subscription or limited to a resource group or to an individual resource such as a Kubernetes cluster.
29+
30+
Using Azure RBAC with your Arc-enabled Kubernetes clusters allows the benefits of Azure role assignments, such as activity logs showing all Azure RBAC changes to an Azure resource.
31+
32+
For more information, see [Azure RBAC on Azure Arc-enabled Kubernetes](conceptual-azure-rbac.md) and [Use Azure RBAC for Azure Arc-enabled Kubernetes clusters](azure-rbac.md).
33+
34+
## Next steps
35+
36+
- Learn about [access and identity options for Azure Kubernetes Service (AKS) clusters](/azure/aks/concepts-identity).
37+
- Learn about [Cluster connect access to Azure Arc-enabled Kubernetes clusters](conceptual-cluster-connect.md).
38+
- Learn about [Azure RBAC on Azure Arc-enabled Kubernetes](conceptual-azure-rbac.md)

articles/azure-arc/kubernetes/toc.yml

Lines changed: 15 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -36,11 +36,15 @@
3636
- name: Data exchange between cluster and Azure
3737
href: conceptual-data-exchange.md
3838
- name: Identity and access management
39-
displayName: rbac, azure ad, azure active directory
40-
href: conceptual-azure-rbac.md
41-
- name: Access cluster from anywhere
42-
displayName: connect
43-
href: conceptual-cluster-connect.md
39+
items:
40+
- name: Identity and access overview
41+
href: identity-access-overview.md
42+
- name: Cluster connect access
43+
displayName: connect
44+
href: conceptual-cluster-connect.md
45+
- name: Azure RBAC integration
46+
displayName: rbac, azure ad, azure active directory
47+
href: conceptual-azure-rbac.md
4448
- name: Extend Azure capabilities to clusters anywhere
4549
items:
4650
- name: Cluster extensions
@@ -83,17 +87,19 @@
8387
items:
8488
- name: Upgrade agents
8589
href: agent-upgrade.md
86-
- name: Securely connect to cluster from anywhere
87-
href: cluster-connect.md
8890
- name: Use Private Link Scope
8991
href: private-link.md
9092
- name: Azure portal Kubernetes resource view
9193
href: kubernetes-resource-view.md
92-
- name: Use Azure AD RBAC for authorization checks
93-
href: azure-rbac.md
9494
- name: Deploy applications consistently
9595
displayName: GitOps, flux, configuration
9696
href: use-azure-policy-flux-2.md
97+
- name: Manage identity and access
98+
items:
99+
- name: Securely connect to cluster from anywhere
100+
href: cluster-connect.md
101+
- name: Use Azure AD RBAC for authorization checks
102+
href: azure-rbac.md
97103
- name: Manage your cluster
98104
items:
99105
- name: Deploy and manage cluster extensions

0 commit comments

Comments
 (0)