Skip to content

Commit e85da00

Browse files
committed
Incorporating feedback
1 parent dd8210f commit e85da00

File tree

1 file changed

+4
-7
lines changed

1 file changed

+4
-7
lines changed

articles/aks/trusted-access-feature.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@ description: Learn how to use the Trusted Access feature to enable Azure resourc
44
author: schaffererin
55
services: container-service
66
ms.topic: article
7-
ms.date: 02/22/2023
7+
ms.date: 02/23/2023
88
ms.author: schaffererin
99
---
1010

11-
# Enable Azure resources to access Azure Kubernetes Service (AKS) clusters using Trusted Access (PREVIEW)
11+
# Enable Azure resources to access Azure Kubernetes Service (AKS) clusters using Trusted Access (Preview)
1212

13-
Many Azure services that integrate with Azure Kubernetes Service (AKS) need access to the Kubernetes API server. In order to avoid granting these services admin access or having to keep your AKS clusters public for network access, you can use the AKS Trusted Access feature.
13+
Many Azure services that integrate with Azure Kubernetes Service (AKS) need access to the Kubernetes API server. In order to avoid granting these services admin access or having to keep your AKS clusters public for network access, you can use the AKS Trusted Access feature.
1414

1515
This feature allows services to securely connect to AKS and Kubernetes via the Azure backend without requiring private endpoint. Instead of relying on identities with [Microsoft Azure Active Directory (Azure AD)](../active-directory/fundamentals/active-directory-whatis.md) permissions, this feature can use your system-assigned managed identity to authenticate with the managed services and applications you want to use on top of AKS.
1616

@@ -22,9 +22,6 @@ Trusted Access addresses the following scenarios:
2222

2323
* For example, you may have to implement high-privileged service-to-service permissions, which aren't ideal during audit reviews.
2424

25-
> [!NOTE]
26-
> Using the Trusted Access feature on Azure RBAC-enabled clusters isn't supported.
27-
2825
This article shows you how to enable secure access from your Azure services to your Kubernetes API server in AKS using Trusted Access.
2926

3027
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
@@ -38,7 +35,7 @@ Trusted Access enables you to give explicit consent to your system-assigned MSI
3835
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3936
* Resource types that support [system-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md).
4037
* Pre-defined Roles with appropriate [AKS permissions](concepts-identity.md).
41-
* To learn about what Roles to use in various scenarios, see [AzureML access to AKS clusters with special configurations](../machine-learning/azureml-aks-ta-support.md).
38+
* To learn about what Roles to use in various scenarios, see [AzureML access to AKS clusters with special configurations](https://github.com/Azure/AML-Kubernetes/blob/master/docs/azureml-aks-ta-support.md).
4239
* If you're using Azure CLI, the **aks-preview** extension version **0.5.74 or later** is required.
4340

4441
First, install the aks-preview extension by running the following command:

0 commit comments

Comments
 (0)