Skip to content

Commit de8a2a0

Browse files
author
Manika Dhiman
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-stack-docs-pr into md-collect-logs-portal
2 parents 1787813 + 20d7ede commit de8a2a0

File tree

79 files changed

+1260
-475
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

79 files changed

+1260
-475
lines changed

.openpublishing.redirection.aks.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1375,6 +1375,11 @@
13751375
"redirect_url": "/azure/aks/hybrid/deploy-load-balancer-cli",
13761376
"redirect_document_id": false
13771377
},
1378+
{
1379+
"source_path": "AKS-Hybrid/offline-download.md",
1380+
"redirect_url": "/azure/aks/hybrid/aks-overview",
1381+
"redirect_document_id": false
1382+
},
13781383
{
13791384
"source_path": "AKS-Hybrid/kubernetes-rbac-azure-ad.md",
13801385
"redirect_url": "/azure/aks/hybrid/kubernetes-rbac-entra-id",

AKS-Hybrid/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,8 +64,6 @@
6464
href: deploy-load-balancer-portal.md
6565
# - name: Troubleshoot issues
6666
# href: load-balancer-troubleshoot.md
67-
- name: Download Kubernetes VHDs manually
68-
href: offline-download.md
6967
- name: Security and authentication
7068
items:
7169
- name: Use Azure RBAC for Kubernetes authorization
@@ -126,6 +124,8 @@
126124
href: aks-known-issues.md
127125
- name: Troubleshoot
128126
href: aks-troubleshoot.md
127+
- name: Use diagnostic checker
128+
href: aks-arc-diagnostic-checker.md
129129
- name: KubeAPIServer unreachable error
130130
href: kube-api-server-unreachable.md
131131
- name: Reference

AKS-Hybrid/ad-sso.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Active Directory single sign-on for secure connection to Kubernetes A
33
description: Use Active Directory Authentication to securely connect to the API server with SSO credentials
44
author: sethmanheim
55
ms.topic: how-to
6-
ms.date: 02/15/2024
6+
ms.date: 06/24/2024
77
ms.author: sethm
88
ms.lastreviewed: 1/14/2022
99
ms.reviewer: sulahiri
@@ -21,7 +21,7 @@ You can create a secure connection to your Kubernetes API server in AKS enabled
2121

2222
## Overview of AD in AKS enabled by Arc
2323

24-
Without Active Directory authentication, users must rely on a certificate-based _kubeconfig_ file when connecting to the API server via the `kubectl` command. The kubeconfig file contains secrets such as private keys and certificates that need to be carefully distributed, which can be a significant security risk.
24+
Without Active Directory authentication, you must rely on a certificate-based _kubeconfig_ file when you connect to the API server via the `kubectl` command. The **kubeconfig** file contains secrets such as private keys and certificates that need to be carefully distributed, which can be a significant security risk.
2525

2626
As an alternative to using certificate-based kubeconfig, you can use AD SSO credentials as a secure way to connect to the API server. AD integration with AKS Arc lets users on a Windows domain-joined machine connect to the API server via `kubectl` using their SSO credentials. This removes the need to manage and distribute certificate-based kubeconfig files that contain private keys.
2727

@@ -32,7 +32,7 @@ Another security benefit with AD integration is that the users and groups are st
3232
> [!NOTE]
3333
> Currently, AD SSO connectivity is only supported for workload clusters.
3434
35-
This article guides you through the following steps to set up Active Directory as the identity provider and to enable SSO via `kubectl`:
35+
This article guides you through the steps to set up Active Directory as the identity provider and to enable SSO via `kubectl`:
3636

3737
- Create the AD account for the API server, and then create the [keytab](https://web.mit.edu/kerberos/krb5-devel/doc/basic/keytab_def.html) file associated with the account. See [Create AD Auth using the keytab file](#create-ad-auth-using-the-keytab-file) to create the AD account and generate the keytab file.
3838
- Use the [keytab](https://web.mit.edu/kerberos/krb5-devel/doc/basic/keytab_def.html) file to install AD Auth on the Kubernetes cluster. As part of this step, a default role-based access control (RBAC) configuration is automatically created.
@@ -87,21 +87,21 @@ Install-AksHciAdAuth -name mynewcluster1 -keytab .\current.keytab -SPN k8s/apise
8787

8888
If the cluster host isn't domain-joined, use the admin user name or group name in SID format, as shown in the following example.
8989

90-
If using an admin user:
90+
Admin user:
9191

9292
```powershell
9393
Install-AksHciAdAuth -name mynewcluster1 -keytab .\current.keytab -SPN k8s/[email protected] -adminUserSID <User SID>
9494
```
9595

96-
If using an admin group:
96+
Admin group:
9797

9898
```powershell
9999
Install-AksHciAdAuth -name mynewcluster1 -keytab .\current.keytab -SPN k8s/[email protected] -adminGroupSID <Group SID>
100100
```
101101

102102
To find the SID for the user account, see [Determine the user or group security identifier](#determine-the-user-or-group-security-identifier).
103103

104-
Before proceeding to the next steps, make note of the following items:
104+
Before you proceed to the next steps, make note of the following items:
105105

106106
- Make sure the keytab file is named **current.keytab**.
107107
- Replace the SPN that corresponds to your environment.
@@ -154,19 +154,19 @@ You should copy the following three files from the AKS workload cluster to your
154154
155155
### Step 6: Connect to the API server from the client machine
156156
157-
After you've completed the previous steps, use your SSO credentials to sign in to your Windows domain-joined client machine. Open PowerShell, and then attempt to access the API server using `kubectl`. If the operation completes successfully, you have set up AD SSO correctly.
157+
After you complete the previous steps, use your SSO credentials to sign in to your Windows domain-joined client machine. Open PowerShell, and then attempt to access the API server using `kubectl`. If the operation completes successfully, you set up AD SSO correctly.
158158
159159
## Create and update the AD group role binding
160160
161-
As mentioned in Step 2, a default role binding with cluster admin privileges is created for the user and/or the group that was provided during installation. Role binding in Kubernetes defines the access policies for AD groups. This step describes how to use RBAC to create new AD group role bindings in Kubernetes and to edit existing role bindings. For example, the cluster admin may want to grant additional privileges to users by using AD groups (which makes the process more efficient). For more information about RBAC, see [using RBAC authorization](https://kubernetes.io/docs/reference/access-authn-authz/rbac/).
161+
As mentioned in Step 2, a default role binding with cluster admin privileges is created for the user and/or the group that was provided during installation. Role binding in Kubernetes defines the access policies for AD groups. This step describes how to use RBAC to create new AD group role bindings in Kubernetes and to edit existing role bindings. For example, the cluster admin might want to grant additional privileges to users by using AD groups (which makes the process more efficient). For more information about RBAC, see [using RBAC authorization](https://kubernetes.io/docs/reference/access-authn-authz/rbac/).
162162
163163
When you create or edit other AD group RBAC entries, the subject name should have the **microsoft:activedirectory:CONTOSO\group name** prefix. Note that the names must contain a domain name and a prefix that are enclosed by double quotes.
164164
165165
Here are two examples:
166166
167167
### Example 1
168168
169-
```yml
169+
```yaml
170170
apiVersion: rbac.authorization.k8s.io/v1
171171
kind: ClusterRoleBinding
172172
metadata:
@@ -185,7 +185,7 @@ subjects:
185185
186186
The following example shows how to create a custom role and role binding for a [namespace](https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/) with an AD group. In the example, `SREGroup` is a pre-existing group in the Contoso Active Directory. When users are added to the AD group, they're immediately granted privileges.
187187

188-
```yml
188+
```yaml
189189
kind: Role
190190
apiVersion: rbac.authorization.k8s.io/v1
191191
metadata:

0 commit comments

Comments
 (0)