Skip to content

Commit 8e0970c

Browse files
authored
Update azure-rbac-23h2.md
1 parent 4e40c7a commit 8e0970c

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

AKS-Arc/azure-rbac-23h2.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,9 +46,13 @@ Before you begin, make sure you have the following prerequisites:
4646
```
4747

4848
- To interact with Kubernetes clusters, you must install [**kubectl**](https://kubernetes.io/docs/tasks/tools/) and [**kubelogin**](https://azure.github.io/kubelogin/install.html).
49-
- You need the following permissions to enable Azure RBAC while creating a Kubernetes cluster:
50-
- To create a Kubernetes cluster, you need the **Azure Kubernetes Service Arc Contributor** role.
51-
- To use the `--enable-azure-rbac` parameter, you need the **Role Based Access Control Administrator** role for access to the **Microsoft.Authorization/roleAssignments/write** permission. For more information, see [Azure built-in roles](/azure/role-based-access-control/built-in-roles/general).
49+
- The following permissions are required to enable Azure RBAC when creating a Kubernetes cluster:
50+
- To create a Kubernetes cluster, the [**Azure Kubernetes Service Arc Contributor**](/azure/role-based-access-control/built-in-roles/containers#azure-kubernetes-service-arc-contributor-role) role is required.
51+
- To use the `--enable-azure-rbac` parameter, the [**Role Based Access Control Administrator**](/azure/role-based-access-control/built-in-roles/privileged#role-based-access-control-administrator) role is required for access to the **Microsoft.Authorization/roleAssignments/write** permission.
52+
- To assign these roles, use the [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create) command or follow [**Assign Azure roles using Azure CLI**](/azure/role-based-access-control/role-assignments-cli) guide:
53+
```azurecli
54+
az role assignment create --assignee <assignee-object-id> --role <role-name-or-id> --scope $ARM_ID
55+
```
5256
- New role assignments can take up to five minutes to propagate and be updated by the authorization server.
5357
- Once Azure RBAC is enabled, you can access your Kubernetes cluster with the given permissions using either direct mode or proxy mode.
5458
- To access the Kubernetes cluster directly using the `az aksarc get-credentials` command, you need the **Microsoft.HybridContainerService/provisionedClusterInstances/listUserKubeconfig/action**, which is included in the **Azure Kubernetes Service Arc Cluster User** role permission.

0 commit comments

Comments
 (0)