Skip to content

Commit 059fab0

Browse files
committed
Tweaks
1 parent a6c9a13 commit 059fab0

File tree

1 file changed

+4
-6
lines changed

1 file changed

+4
-6
lines changed

AKS-Arc/aks-edge-howto-key-manager.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use the Key Manager for Kubernetes extension to rotate
44
ms.topic: how-to
55
author: sethmanheim
66
ms.author: sethm
7-
ms.date: 02/24/2025
7+
ms.date: 02/27/2025
88
ms.reviewer: leslielin
99
---
1010

@@ -53,10 +53,8 @@ Before you begin, ensure you have the following prerequisites:
5353

5454
`trust-manager` is used to distribute a trust bundle to components.
5555

56-
- The key manager extension only works with [bounded service account tokens](https://kubernetes.io/docs/reference/access-authn-authz/service-accounts-admin/#manual-secret-management-for-serviceaccounts). It doesn't support legacy tokens with infinite lifetimes. If your workflow relies on legacy tokens, do not install this extension.
57-
- Bounded service account tokens have a default lifetime of one year. To rotate these tokens, this lifetime should be reduced to one day, which ensures that tokens are rapidly reissued and signed with newly rotated keys. To implement these changes, you must modify the `api-server` configuration as follows.
58-
59-
Run the following commands:
56+
- The Key Manager extension only works with [bounded service account tokens](https://kubernetes.io/docs/reference/access-authn-authz/service-accounts-admin/#manual-secret-management-for-serviceaccounts). It doesn't support legacy tokens with infinite lifetimes. If your workflow relies on legacy tokens, do not install this extension.
57+
- Bounded service account tokens have a default lifetime of one year. To rotate these tokens, this lifetime should be reduced to one day, which ensures that tokens are rapidly reissued and signed with newly rotated keys. To implement these changes, you must modify the `api-server` configuration by running the following commands:
6058

6159
```powershell
6260
$url = "https://raw.githubusercontent.com/Azure/AKS-Edge/refs/heads/main/tools/scripts/AksEdgeKeyManagerExtension/UpdateK3sConfigForKeyManager.ps1"
@@ -70,7 +68,7 @@ Before you begin, ensure you have the following prerequisites:
7068
## Install the Key Manager for Kubernetes extension for service account key rotation
7169

7270
> [!IMPORTANT]
73-
> After you install the key manager, the `api-server` is updated with the new service account token during token rotation. This process briefly makes the API server inaccessible as it restarts.
71+
> After you install the Key Manager extension, the `api-server` is updated with the new service account token during token rotation. This process briefly makes the API server inaccessible while it restarts.
7472

7573
Now run the following commands. Replace the variables with your specific resource group name and AKS cluster name:
7674

0 commit comments

Comments
 (0)