Skip to content

Commit d0ee5cb

Browse files
Merge pull request #17995 from leslielin-5/patch-42
Update azure-rbac-local.md
2 parents 7e2d9da + 3747a21 commit d0ee5cb

File tree

1 file changed

+22
-3
lines changed

1 file changed

+22
-3
lines changed

AKS-Arc/azure-rbac-local.md

Lines changed: 22 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ ms.custom: devx-track-azurecli
66
author: sethmanheim
77
ms.author: sethm
88
ms.reviewer: leslielin
9-
ms.date: 02/21/2025
10-
ms.lastreviewed: 02/21/2025
9+
ms.date: 05/21/2025
10+
ms.lastreviewed: 05/21/2025
1111

1212
# Intent: As an IT Pro, I want to use Azure RBAC to authenticate connections to my AKS clusters over the Internet or on a private network.
1313
# Keyword: Kubernetes role-based access control AKS Azure RBAC AD
@@ -31,7 +31,7 @@ For a conceptual overview, see [Azure RBAC for Kubernetes Authorization](concept
3131
Before you begin, make sure you have the following prerequisites:
3232

3333
- AKS on Azure Local currently supports enabling Azure RBAC only during Kubernetes cluster creation. You can't enable Azure RBAC after the Kubernetes cluster is created.
34-
- Install the latest version of the **aksarc** and **connectedk8s** Azure CLI extensions. Note that you need to run the **aksarc** extension version 1.1.1 or later to enable Azure RBAC. Run `az --version` to find the current version. If you need to install or upgrade Azure CLI, see [Install Azure CLI](/cli/azure/install-azure-cli).
34+
- You can enable Azure RBAC using either Azure CLI or the Azure portal. To use Azure CLI, you must install the latest versions of the **aksarc** and **connectedk8s** Azure CLI extensions. Note that you need the **aksarc** extension version 1.1.1 or later to enable Azure RBAC. Run `az --version` to find the current version. If you need to install or upgrade Azure CLI, see [Install Azure CLI](/cli/azure/install-azure-cli).
3535

3636
```azurecli
3737
az extension add --name aksarc
@@ -67,18 +67,30 @@ Before you begin, make sure you have the following prerequisites:
6767
6868
You can create an Azure RBAC-enabled Kubernetes cluster for authorization and a Microsoft Entra ID for authentication.
6969
70+
### [Azure CLI](#tab/azurecli)
71+
7072
```azurecli
7173
az aksarc create -n $aks_cluster_name -g $resource_group_name --custom-location $customlocation_ID --vnet-ids $logicnet_Id --generate-ssh-keys --enable-azure-rbac
7274
```
7375

7476
After a few minutes, the command completes and returns JSON-formatted information about the cluster.
7577

78+
### [Azure portal](#tab/azureportal)
79+
80+
1. Go to **Kubernetes - Azure Arc**, select the **Add** icon, and then select **Create a Kubernetes cluster with Azure Arc**.
81+
1. Under the **Access** tab, locate the authentication and authorization settings. Select **Microsoft Entra Authentication with Azure RBAC**.
82+
1. Complete all other desired configurations for your cluster.
83+
1. Select **Review + create** to create the cluster.
84+
---
85+
7686
## Step 2: Create role assignments for users to access the cluster
7787

7888
[!INCLUDE [built-in-roles](includes/built-in-roles.md)]
7989

8090
You can use the [`az role assignment create`](/cli/azure/role/assignment#az-role-assignment-create) command to create role assignments.
8191

92+
### [Azure CLI](#tab/azurecli)
93+
8294
First, get the `$ARM-ID` for the target cluster to which you want to assign a role.
8395

8496
```azurecli
@@ -95,6 +107,13 @@ az role assignment create --role "Azure Arc Kubernetes Viewer" --assignee <assig
95107

96108
In this example, the scope is the Azure Resource Manager ID of the cluster. It can also be the resource group containing the Kubernetes cluster.
97109

110+
### [Azure portal](#tab/azureportal)
111+
112+
1. Go to **Azure Arc | Kubernetes clusters** and locate your Azure RBAC-enabled cluster for which you want to assign roles.
113+
1. Navigate to **Access control (IAM)**, select the **Add** icon, and then select **Add role assignment**. If the **Add role assignment** option is disabled, verify that Azure RBAC is enabled by checking **Settings > Properties > AAD profile > Enable Azure RBAC**.
114+
1. Follow the instructions to complete the role assignment.
115+
---
116+
98117
### Create custom role definitions
99118

100119
You can choose to create your own role definition for use in role assignments.

0 commit comments

Comments
 (0)