You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/control-kubeconfig-access.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,8 +49,8 @@ These RBAC roles can be applied to an Azure Active Directory (AD) user or group.
49
49
To assign one of the available roles, you need to get the resource ID of the AKS cluster and the ID of the Azure AD user account or group. The following example commands:
50
50
51
51
* Get the cluster resource ID using the [az aks show][az-aks-show] command for the cluster named *myAKSCluster* in the *myResourceGroup* resource group. Provide your own cluster and resource group name as needed.
52
-
*Uses the [az account show][az-account-show] and [az ad user show][az-ad-user-show] commands to get your user ID.
53
-
* Finally, assigns a role using the [az role assignment create][az-role-assignment-create] command.
52
+
*Use the [az account show][az-account-show] and [az ad user show][az-ad-user-show] commands to get your user ID.
53
+
* Finally, assign a role using the [az role assignment create][az-role-assignment-create] command.
54
54
55
55
The following example assigns the *Azure Kubernetes Service Cluster Admin Role* to an individual user account:
0 commit comments