Skip to content

Commit e1fc0e7

Browse files
authored
pencil edits
Line 36: Added lightbox to increase legibility of image Lines 310, 322: sign in > sign-in
1 parent 6733133 commit e1fc0e7

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/aks/azure-ad-rbac.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ From your browser, sign in to the [Azure portal](https://portal.azure.com).
3333

3434
Navigate to Kubernetes services, and from the left-hand pane select **Cluster configuration**. On the page, under the section **Authentication and Authorization**, verify the option **Local accounts with Kubernetes RBAC** is shown.
3535

36-
:::image type="content" source="./media/azure-ad-rbac/rbac-portal.png" alt-text="Example of Authentication and Authorization page in Azure portal.":::
36+
:::image type="content" source="./media/azure-ad-rbac/rbac-portal.png" alt-text="Example of Authentication and Authorization page in Azure portal." lightbox="./media/azure-ad-rbac/rbac-portal.png":::
3737

3838
#### [Azure CLI](#tab/azure-cli)
3939

@@ -307,7 +307,7 @@ kubectl apply -f rolebinding-sre-namespace.yaml
307307

308308
Now, let's test the expected permissions work when you create and manage resources in an AKS cluster. In these examples, you schedule and view pods in the user's assigned namespace. Then, you try to schedule and view pods outside of the assigned namespace.
309309

310-
First, reset the *kubeconfig* context using the [az aks get-credentials][az-aks-get-credentials] command. In a previous section, you set the context using the cluster admin credentials. The admin user bypasses Azure AD sign in prompts. Without the `--admin` parameter, the user context is applied that requires all requests to be authenticated using Azure AD.
310+
First, reset the *kubeconfig* context using the [az aks get-credentials][az-aks-get-credentials] command. In a previous section, you set the context using the cluster admin credentials. The admin user bypasses Azure AD sign-in prompts. Without the `--admin` parameter, the user context is applied that requires all requests to be authenticated using Azure AD.
311311

312312
```azurecli-interactive
313313
az aks get-credentials --resource-group myResourceGroup --name myAKSCluster --overwrite-existing
@@ -319,7 +319,7 @@ Schedule a basic NGINX pod using the [kubectl run][kubectl-run] command in the *
319319
kubectl run nginx-dev --image=mcr.microsoft.com/oss/nginx/nginx:1.15.5-alpine --namespace dev
320320
```
321321

322-
As the sign in prompt, enter the credentials for your own `[email protected]` account created at the start of the article. Once you are successfully signed in, the account token is cached for future `kubectl` commands. The NGINX is successfully schedule, as shown in the following example output:
322+
As the sign-in prompt, enter the credentials for your own `[email protected]` account created at the start of the article. Once you are successfully signed in, the account token is cached for future `kubectl` commands. The NGINX is successfully schedule, as shown in the following example output:
323323

324324
```console
325325
$ kubectl run nginx-dev --image=mcr.microsoft.com/oss/nginx/nginx:1.15.5-alpine --namespace dev
@@ -462,4 +462,4 @@ For best practices on identity and resource control, see [Best practices for aut
462462
[az-ad-group-show]: /cli/azure/ad/group#az_ad_group_show
463463
[rbac-authorization]: concepts-identity.md#kubernetes-rbac
464464
[operator-best-practices-identity]: operator-best-practices-identity.md
465-
[terraform-on-azure]: /azure/developer/terraform/overview
465+
[terraform-on-azure]: /azure/developer/terraform/overview

0 commit comments

Comments
 (0)