Skip to content

Commit bcb390b

Browse files
committed
update wording
1 parent 4d02a33 commit bcb390b

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/azure-arc/kubernetes/kubernetes-resource-view.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,13 @@ The Azure portal includes a Kubernetes resource view for easy access to the Kube
1515

1616
- An account that can authenticate to the cluster and access the resources in the portal:
1717

18-
- If using [cluster connect with service account token authentication](cluster-connect.md#service-account-token-authentication-option), ensure that the service account has a role that can authenticate to the cluster, such as `cluster-admin`:
18+
- If using [cluster connect with service account token authentication](cluster-connect.md#service-account-token-authentication-option), ensure that the account that will access the portal has a role that can authenticate to the cluster, such as `cluster-admin`:
1919

2020
```console
21-
kubectl create clusterrolebinding demo-user-binding --clusterrole cluster-admin --serviceaccount default:demo-user`
21+
kubectl create clusterrolebinding demo-user-binding --clusterrole cluster-admin --user=$AAD_ENTITY_OBJECT_ID`
2222
```
2323

24-
- If using [Azure RBAC](azure-rbac.md), assign a role to your Azure Active Directory (Azure AD) entity that lets it authenticate to the cluster, such as [Azure Arc Kubernetes Viewer](/azure/role-based-access-control/built-in-roles):
24+
- If using [Azure RBAC](azure-rbac.md), ensure that the Azure Active Directory (Azure AD) account that will access the portal has a role that lets it authenticate to the cluster, such as [Azure Arc Kubernetes Viewer](/azure/role-based-access-control/built-in-roles):
2525

2626
```azurecli
2727
az role assignment create --role "Azure Arc Kubernetes Viewer" --assignee $AAD_ENTITY_OBJECT_ID --scope $ARM_ID_CLUSTER

0 commit comments

Comments
 (0)