Skip to content

Commit a27639d

Browse files
authored
Update azure-rbac-local.md
1 parent f31210d commit a27639d

File tree

1 file changed

+15
-1
lines changed

1 file changed

+15
-1
lines changed

AKS-Arc/azure-rbac-local.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ For a conceptual overview, see [Azure RBAC for Kubernetes Authorization](concept
3131
Before you begin, make sure you have the following prerequisites:
3232

3333
- AKS on Azure Local currently supports enabling Azure RBAC only during Kubernetes cluster creation. You can't enable Azure RBAC after the Kubernetes cluster is created.
34-
- Install the latest version of the **aksarc** and **connectedk8s** Azure CLI extensions. Note that you need to run the **aksarc** extension version 1.1.1 or later to enable Azure RBAC. Run `az --version` to find the current version. If you need to install or upgrade Azure CLI, see [Install Azure CLI](/cli/azure/install-azure-cli).
34+
- You can enable Azure RBAC through either Azure CLI or Azure Portal. To use Azure CLI, you'll need to install the latest versions of the **aksarc** and **connectedk8s** Azure CLI extensions. Note that you need to run the **aksarc** extension version 1.1.1 or later to enable Azure RBAC. Run `az --version` to find the current version. If you need to install or upgrade Azure CLI, see [Install Azure CLI](/cli/azure/install-azure-cli).
3535

3636
```azurecli
3737
az extension add --name aksarc
@@ -67,18 +67,27 @@ Before you begin, make sure you have the following prerequisites:
6767
6868
You can create an Azure RBAC-enabled Kubernetes cluster for authorization and a Microsoft Entra ID for authentication.
6969
70+
### [Azure CLI](#tab/azurecli)
71+
7072
```azurecli
7173
az aksarc create -n $aks_cluster_name -g $resource_group_name --custom-location $customlocation_ID --vnet-ids $logicnet_Id --generate-ssh-keys --enable-azure-rbac
7274
```
7375

7476
After a few minutes, the command completes and returns JSON-formatted information about the cluster.
7577

78+
### [Azure Portal](#tab/azureportal)
79+
1. Go to **Kubernetes - Azure Arc**, click the **Add** icon, and select **Create a Kubernetes cluster with Azure Arc**.
80+
2. Under the **Access** tab, locate the authentication and authorization settings. Select **Microsoft Entra Authentication with Azure RBAC**.
81+
3. Complete all other desired configurations for your cluster.
82+
4. Select **Review + create** to create the cluster.
83+
7684
## Step 2: Create role assignments for users to access the cluster
7785

7886
[!INCLUDE [built-in-roles](includes/built-in-roles.md)]
7987

8088
You can use the [`az role assignment create`](/cli/azure/role/assignment#az-role-assignment-create) command to create role assignments.
8189

90+
### [Azure CLI](#tab/azurecli)
8291
First, get the `$ARM-ID` for the target cluster to which you want to assign a role.
8392

8493
```azurecli
@@ -95,6 +104,11 @@ az role assignment create --role "Azure Arc Kubernetes Viewer" --assignee <assig
95104

96105
In this example, the scope is the Azure Resource Manager ID of the cluster. It can also be the resource group containing the Kubernetes cluster.
97106

107+
### [Azure Portal](#tab/azureportal)
108+
1. Go to **Azure Arc | Kubernetes clusters** and locate your Azure RBAC-enabled cluster where you want to assign roles.
109+
2. Navigate to **Access control (IAM)**, click the **Add** icon, and select **Add role assignment**. Note: If the Add role assignment option is disabled, verify if Azure RBAC is enabled by checking **Settings >> Properties >> AAD profile >> Enable Azure RBAC**.
110+
3. Follow the instruction to complete the role assignment.
111+
98112
### Create custom role definitions
99113

100114
You can choose to create your own role definition for use in role assignments.

0 commit comments

Comments
 (0)