Skip to content

Commit a9881f7

Browse files
authored
Update dates and improve role assignment instructions
1 parent 8e0970c commit a9881f7

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

AKS-Arc/azure-rbac-23h2.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ ms.custom: devx-track-azurecli
66
author: sethmanheim
77
ms.author: sethm
88
ms.reviewer: leslielin
9-
ms.date: 07/26/2024
10-
ms.lastreviewed: 07/26/2024
9+
ms.date: 02/21/2025
10+
ms.lastreviewed: 02/21/2025
1111

1212
# Intent: As an IT Pro, I want to use Azure RBAC to authenticate connections to my AKS clusters over the Internet or on a private network.
1313
# Keyword: Kubernetes role-based access control AKS Azure RBAC AD
@@ -49,10 +49,12 @@ Before you begin, make sure you have the following prerequisites:
4949
- The following permissions are required to enable Azure RBAC when creating a Kubernetes cluster:
5050
- To create a Kubernetes cluster, the [**Azure Kubernetes Service Arc Contributor**](/azure/role-based-access-control/built-in-roles/containers#azure-kubernetes-service-arc-contributor-role) role is required.
5151
- To use the `--enable-azure-rbac` parameter, the [**Role Based Access Control Administrator**](/azure/role-based-access-control/built-in-roles/privileged#role-based-access-control-administrator) role is required for access to the **Microsoft.Authorization/roleAssignments/write** permission.
52-
- To assign these roles, use the [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create) command or follow [**Assign Azure roles using Azure CLI**](/azure/role-based-access-control/role-assignments-cli) guide:
53-
```azurecli
54-
az role assignment create --assignee <assignee-object-id> --role <role-name-or-id> --scope $ARM_ID
55-
```
52+
- To assign these roles, use the [`az role assignment create`](/cli/azure/role/assignment#az-role-assignment-create) CLI command, or follow [Assign Azure roles using Azure CLI](/azure/role-based-access-control/role-assignments-cli):
53+
54+
```azurecli
55+
az role assignment create --assignee <assignee-object-id> --role <role-name-or-id> --scope $ARM_ID
56+
```
57+
5658
- New role assignments can take up to five minutes to propagate and be updated by the authorization server.
5759
- Once Azure RBAC is enabled, you can access your Kubernetes cluster with the given permissions using either direct mode or proxy mode.
5860
- To access the Kubernetes cluster directly using the `az aksarc get-credentials` command, you need the **Microsoft.HybridContainerService/provisionedClusterInstances/listUserKubeconfig/action**, which is included in the **Azure Kubernetes Service Arc Cluster User** role permission.

0 commit comments

Comments
 (0)