Skip to content

Commit e04cfb8

Browse files
committed
acrolinx fix
1 parent a5c5c68 commit e04cfb8

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/aks/control-kubeconfig-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,8 +49,8 @@ These RBAC roles can be applied to an Azure Active Directory (AD) user or group.
4949
To assign one of the available roles, you need to get the resource ID of the AKS cluster and the ID of the Azure AD user account or group. The following example commands:
5050

5151
* Get the cluster resource ID using the [az aks show][az-aks-show] command for the cluster named *myAKSCluster* in the *myResourceGroup* resource group. Provide your own cluster and resource group name as needed.
52-
* Uses the [az account show][az-account-show] and [az ad user show][az-ad-user-show] commands to get your user ID.
53-
* Finally, assigns a role using the [az role assignment create][az-role-assignment-create] command.
52+
* Use the [az account show][az-account-show] and [az ad user show][az-ad-user-show] commands to get your user ID.
53+
* Finally, assign a role using the [az role assignment create][az-role-assignment-create] command.
5454

5555
The following example assigns the *Azure Kubernetes Service Cluster Admin Role* to an individual user account:
5656

0 commit comments

Comments
 (0)