You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: AKS-Arc/azure-rbac-local.md
+15-1Lines changed: 15 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ For a conceptual overview, see [Azure RBAC for Kubernetes Authorization](concept
31
31
Before you begin, make sure you have the following prerequisites:
32
32
33
33
- AKS on Azure Local currently supports enabling Azure RBAC only during Kubernetes cluster creation. You can't enable Azure RBAC after the Kubernetes cluster is created.
34
-
-Install the latest version of the **aksarc** and **connectedk8s** Azure CLI extensions. Note that you need to run the **aksarc** extension version 1.1.1 or later to enable Azure RBAC. Run `az --version` to find the current version. If you need to install or upgrade Azure CLI, see [Install Azure CLI](/cli/azure/install-azure-cli).
34
+
-You can enable Azure RBAC through either Azure CLI or Azure Portal. To use Azure CLI, you'll need to install the latest versions of the **aksarc** and **connectedk8s** Azure CLI extensions. Note that you need to run the **aksarc** extension version 1.1.1 or later to enable Azure RBAC. Run `az --version` to find the current version. If you need to install or upgrade Azure CLI, see [Install Azure CLI](/cli/azure/install-azure-cli).
35
35
36
36
```azurecli
37
37
az extension add --name aksarc
@@ -67,18 +67,27 @@ Before you begin, make sure you have the following prerequisites:
67
67
68
68
You can create an Azure RBAC-enabled Kubernetes cluster for authorization and a Microsoft Entra ID for authentication.
You can use the [`az role assignment create`](/cli/azure/role/assignment#az-role-assignment-create) command to create role assignments.
81
89
90
+
### [Azure CLI](#tab/azurecli)
82
91
First, get the `$ARM-ID` for the target cluster to which you want to assign a role.
83
92
84
93
```azurecli
@@ -95,6 +104,11 @@ az role assignment create --role "Azure Arc Kubernetes Viewer" --assignee <assig
95
104
96
105
In this example, the scope is the Azure Resource Manager ID of the cluster. It can also be the resource group containing the Kubernetes cluster.
97
106
107
+
### [Azure Portal](#tab/azureportal)
108
+
1. Go to **Azure Arc | Kubernetes clusters** and locate your Azure RBAC-enabled cluster where you want to assign roles.
109
+
2. Navigate to **Access control (IAM)**, click the **Add** icon, and select **Add role assignment**. Note: If the Add role assignment option is disabled, verify if Azure RBAC is enabled by checking **Settings >> Properties >> AAD profile >> Enable Azure RBAC**.
110
+
3. Follow the instruction to complete the role assignment.
111
+
98
112
### Create custom role definitions
99
113
100
114
You can choose to create your own role definition for use in role assignments.
0 commit comments