Skip to content

Commit e666f47

Browse files
committed
Adding same messaging from legacy docs that explains how to assign permissions based on whether the user is in the same Azure AD tenant
1 parent b7a88ce commit e666f47

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

articles/aks/azure-ad-rbac.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -184,6 +184,8 @@ kubectl create namespace dev
184184

185185
> [!NOTE]
186186
> In Kubernetes, *Roles* define the permissions to grant, and *RoleBindings* apply them to desired users or groups. These assignments can be applied to a given namespace, or across the entire cluster. For more information, see [Using Kubernetes RBAC authorization][rbac-authorization].
187+
>
188+
> If the user you grant the Kubernetes RBAC binding for is in the same Azure AD tenant, assign permissions based on the *userPrincipalName (UPN)*. If the user is in a different Azure AD tenant, query for and use the *objectId* property instead.
187189
188190
3. Create a Role for the *dev* namespace, which grants full permissions to the namespace. In production environments, you can specify more granular permissions for different users or groups. Create a file named `role-dev-namespace.yaml` and paste the following YAML manifest:
189191

0 commit comments

Comments
 (0)