You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: AKS-Hybrid/ad-sso.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use Active Directory single sign-on for secure connection to Kubernetes A
3
3
description: Use Active Directory Authentication to securely connect to the API server with SSO credentials
4
4
author: sethmanheim
5
5
ms.topic: how-to
6
-
ms.date: 02/15/2024
6
+
ms.date: 06/24/2024
7
7
ms.author: sethm
8
8
ms.lastreviewed: 1/14/2022
9
9
ms.reviewer: sulahiri
@@ -21,7 +21,7 @@ You can create a secure connection to your Kubernetes API server in AKS enabled
21
21
22
22
## Overview of AD in AKS enabled by Arc
23
23
24
-
Without Active Directory authentication, users must rely on a certificate-based _kubeconfig_ file when connecting to the API server via the `kubectl` command. The kubeconfig file contains secrets such as private keys and certificates that need to be carefully distributed, which can be a significant security risk.
24
+
Without Active Directory authentication, you must rely on a certificate-based _kubeconfig_ file when you connect to the API server via the `kubectl` command. The **kubeconfig** file contains secrets such as private keys and certificates that need to be carefully distributed, which can be a significant security risk.
25
25
26
26
As an alternative to using certificate-based kubeconfig, you can use AD SSO credentials as a secure way to connect to the API server. AD integration with AKS Arc lets users on a Windows domain-joined machine connect to the API server via `kubectl` using their SSO credentials. This removes the need to manage and distribute certificate-based kubeconfig files that contain private keys.
27
27
@@ -32,7 +32,7 @@ Another security benefit with AD integration is that the users and groups are st
32
32
> [!NOTE]
33
33
> Currently, AD SSO connectivity is only supported for workload clusters.
34
34
35
-
This article guides you through the following steps to set up Active Directory as the identity provider and to enable SSO via `kubectl`:
35
+
This article guides you through the steps to set up Active Directory as the identity provider and to enable SSO via `kubectl`:
36
36
37
37
- Create the AD account for the API server, and then create the [keytab](https://web.mit.edu/kerberos/krb5-devel/doc/basic/keytab_def.html) file associated with the account. See [Create AD Auth using the keytab file](#create-ad-auth-using-the-keytab-file) to create the AD account and generate the keytab file.
38
38
- Use the [keytab](https://web.mit.edu/kerberos/krb5-devel/doc/basic/keytab_def.html) file to install AD Auth on the Kubernetes cluster. As part of this step, a default role-based access control (RBAC) configuration is automatically created.
To find the SID for the user account, see [Determine the user or group security identifier](#determine-the-user-or-group-security-identifier).
103
103
104
-
Before proceeding to the next steps, make note of the following items:
104
+
Before you proceed to the next steps, make note of the following items:
105
105
106
106
- Make sure the keytab file is named **current.keytab**.
107
107
- Replace the SPN that corresponds to your environment.
@@ -154,19 +154,19 @@ You should copy the following three files from the AKS workload cluster to your
154
154
155
155
### Step 6: Connect to the API server from the client machine
156
156
157
-
After you've completed the previous steps, use your SSO credentials to sign in to your Windows domain-joined client machine. Open PowerShell, and then attempt to access the API server using `kubectl`. If the operation completes successfully, you haveset up AD SSO correctly.
157
+
After you complete the previous steps, use your SSO credentials to sign in to your Windows domain-joined client machine. Open PowerShell, and then attempt to access the API server using `kubectl`. If the operation completes successfully, you set up AD SSO correctly.
158
158
159
159
## Create and update the AD group role binding
160
160
161
-
As mentioned in Step 2, a default role binding with cluster admin privileges is created forthe user and/or the group that was provided during installation. Role bindingin Kubernetes defines the access policies forAD groups. This step describes how to use RBAC to create new AD group role bindingsin Kubernetes and to edit existing role bindings. For example, the cluster admin may want to grant additional privileges to users by using AD groups (which makes the process more efficient). For more information about RBAC, see [using RBAC authorization](https://kubernetes.io/docs/reference/access-authn-authz/rbac/).
161
+
As mentioned in Step 2, a default role binding with cluster admin privileges is created for the user and/or the group that was provided during installation. Role binding in Kubernetes defines the access policies for AD groups. This step describes how to use RBAC to create new AD group role bindings in Kubernetes and to edit existing role bindings. For example, the cluster admin might want to grant additional privileges to users by using AD groups (which makes the process more efficient). For more information about RBAC, see [using RBAC authorization](https://kubernetes.io/docs/reference/access-authn-authz/rbac/).
162
162
163
163
When you create or edit other AD group RBAC entries, the subject name should have the **microsoft:activedirectory:CONTOSO\group name** prefix. Note that the names must contain a domain name and a prefix that are enclosed by double quotes.
164
164
165
165
Here are two examples:
166
166
167
167
### Example 1
168
168
169
-
```yml
169
+
```yaml
170
170
apiVersion: rbac.authorization.k8s.io/v1
171
171
kind: ClusterRoleBinding
172
172
metadata:
@@ -185,7 +185,7 @@ subjects:
185
185
186
186
The following example shows how to create a custom role and role binding for a [namespace](https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/) with an AD group. In the example, `SREGroup` is a pre-existing group in the Contoso Active Directory. When users are added to the AD group, they're immediately granted privileges.
0 commit comments