You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/azure-rbac.md
+37-37Lines changed: 37 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ A conceptual overview of this feature is available in the [Azure RBAC on Azure A
34
34
- [Upgrade your agents](agent-upgrade.md#manually-upgrade-agents) to the latest version.
35
35
36
36
> [!NOTE]
37
-
> You can't set up this feature for managed Kubernetes offerings of cloud providers like Elastic Kubernetes Service or Google Kubernetes Engine where the user doesn't have access to the API server of the cluster. For Azure Kubernetes Service (AKS) clusters, this [feature is available natively](../../aks/manage-azure-rbac.md) and doesn't require the AKS cluster to be connected to Azure Arc. This feature isn't supported on AKS on Azure Stack HCI.
37
+
> You can't set up this feature for managed Kubernetes offerings of cloud providers like Elastic Kubernetes Service or Google Kubernetes Engine where the user doesn't have access to the API server of the cluster. For Azure Kubernetes Service (AKS) clusters, this [feature is available natively](../../aks/manage-azure-rbac.md) and doesn't require the AKS cluster to be connected to Azure Arc. For AKS on Azure Stack HCI, see [Use Azure RBAC for AKS hybrid clusters (preview)](/azure/aks/hybrid/azure-rbac-aks-hybrid).
38
38
39
39
## Set up Azure AD applications
40
40
@@ -44,32 +44,32 @@ A conceptual overview of this feature is available in the [Azure RBAC on Azure A
44
44
45
45
1. Create a new Azure AD application and get its `appId` value. This value is used in later steps as `serverApplicationId`.
1. To grant "Sign in and read user profile" API permissions to the server application. Copy this JSON and save it in a file called oauth2-permissions.json:
56
56
57
-
```json
58
-
{
59
-
"oauth2PermissionScopes": [
60
-
{
61
-
"adminConsentDescription": "Sign in and read user profile",
62
-
"adminConsentDisplayName": "Sign in and read user profile",
63
-
"id": "<unique_guid>",
64
-
"isEnabled": true,
65
-
"type": "User",
66
-
"userConsentDescription": "Sign in and read user profile",
67
-
"userConsentDisplayName": "Sign in and read user profile",
68
-
"value": "User.Read"
69
-
}
70
-
]
71
-
}
72
-
```
57
+
```json
58
+
{
59
+
"oauth2PermissionScopes": [
60
+
{
61
+
"adminConsentDescription": "Sign in and read user profile",
62
+
"adminConsentDisplayName": "Sign in and read user profile",
63
+
"id": "<paste_the_SERVER_APP_ID>",
64
+
"isEnabled": true,
65
+
"type": "User",
66
+
"userConsentDescription": "Sign in and read user profile",
67
+
"userConsentDisplayName": "Sign in and read user profile",
68
+
"value": "User.Read"
69
+
}
70
+
]
71
+
}
72
+
```
73
73
74
74
1. Update the application's group membership claims. Run the commands in the same directory as `oauth2-permissions.json` file. RBAC for Azure Arc-enabled Kubernetes requires [`signInAudience` to be set to **AzureADMyOrg**](../../active-directory/develop/supported-accounts-validation.md):
75
75
@@ -95,10 +95,10 @@ A conceptual overview of this feature is available in the [Azure RBAC on Azure A
95
95
az ad app permission grant --id "${SERVER_APP_ID}" --api 00000003-0000-0000-c000-000000000000 --scope User.Read
96
96
```
97
97
98
-
> [!NOTE]
99
-
> An Azure tenant administrator has to run this step.
100
-
>
101
-
> For usage of this feature in production, we recommend that you create a different server application for every cluster.
98
+
> [!NOTE]
99
+
> An Azure [application administrator](../../active-directory/roles/permissions-reference.md#application-administrator) has to run this step.
100
+
>
101
+
> For usage of this feature in production, we recommend that you create a different server application for every cluster.
102
102
103
103
#### Create a client application
104
104
@@ -139,13 +139,13 @@ A conceptual overview of this feature is available in the [Azure RBAC on Azure A
139
139
140
140
1. Create a new Azure AD application and get its `appId` value. This value is used in later steps as `serverApplicationId`.
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/quickstart-connect-cluster.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -146,6 +146,7 @@ For a conceptual look at connecting clusters to Azure Arc, see [Azure Arc-enable
146
146
|`https://k8connecthelm.azureedge.net` | `az connectedk8s connect` uses Helm 3 to deploy Azure Arc agents on the Kubernetes cluster. This endpoint is needed for Helm client download to facilitate deployment of the agent helm chart. |
147
147
|`guestnotificationservice.azure.com`, `*.guestnotificationservice.azure.com`, `sts.windows.net`, `https://k8sconnectcsp.azureedge.net` | For [Cluster Connect](cluster-connect.md) and for [Custom Location](custom-locations.md) based scenarios. |
148
148
|`*.servicebus.windows.net` | For [Cluster Connect](cluster-connect.md) and for [Custom Location](custom-locations.md) based scenarios. |
149
+
|`https://graph.microsoft.com/` | Required when [Azure RBAC](azure-rbac.md) is configured |
149
150
150
151
> [!NOTE]
151
152
> To translate the `*.servicebus.windows.net` wildcard into specific endpoints, use the command `\GET https://guestnotificationservice.azure.com/urls/allowlist?api-version=2020-01-01&location=<location>`. Within this command, the region must be specified for the `<location>` placeholder.
0 commit comments