Skip to content

Commit f22a995

Browse files
Merge pull request #17122 from leslielin-5/patch-32
Update azure-rbac-23h2.md
2 parents ae3087d + af2c462 commit f22a995

File tree

1 file changed

+11
-5
lines changed

1 file changed

+11
-5
lines changed

AKS-Arc/azure-rbac-23h2.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ ms.custom: devx-track-azurecli
66
author: sethmanheim
77
ms.author: sethm
88
ms.reviewer: leslielin
9-
ms.date: 07/26/2024
10-
ms.lastreviewed: 07/26/2024
9+
ms.date: 02/21/2025
10+
ms.lastreviewed: 02/21/2025
1111

1212
# Intent: As an IT Pro, I want to use Azure RBAC to authenticate connections to my AKS clusters over the Internet or on a private network.
1313
# Keyword: Kubernetes role-based access control AKS Azure RBAC AD
@@ -46,9 +46,15 @@ Before you begin, make sure you have the following prerequisites:
4646
```
4747

4848
- To interact with Kubernetes clusters, you must install [**kubectl**](https://kubernetes.io/docs/tasks/tools/) and [**kubelogin**](https://azure.github.io/kubelogin/install.html).
49-
- You need the following permissions to enable Azure RBAC while creating a Kubernetes cluster:
50-
- To create a Kubernetes cluster, you need the **Azure Kubernetes Service Arc Contributor** role.
51-
- To use the `--enable-azure-rbac` parameter, you need the **Role Based Access Control Administrator** role for access to the **Microsoft.Authorization/roleAssignments/write** permission. For more information, see [Azure built-in roles](/azure/role-based-access-control/built-in-roles/general).
49+
- The following permissions are required to enable Azure RBAC when creating a Kubernetes cluster:
50+
- To create a Kubernetes cluster, the [**Azure Kubernetes Service Arc Contributor**](/azure/role-based-access-control/built-in-roles/containers#azure-kubernetes-service-arc-contributor-role) role is required.
51+
- To use the `--enable-azure-rbac` parameter, the [**Role Based Access Control Administrator**](/azure/role-based-access-control/built-in-roles/privileged#role-based-access-control-administrator) role is required for access to the **Microsoft.Authorization/roleAssignments/write** permission.
52+
- To assign these roles, use the [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create) CLI command, or follow [Assign Azure roles using Azure CLI](/azure/role-based-access-control/role-assignments-cli):
53+
54+
```azurecli
55+
az role assignment create --assignee <assignee-object-id> --role <role-name-or-id> --scope $ARM_ID
56+
```
57+
5258
- New role assignments can take up to five minutes to propagate and be updated by the authorization server.
5359
- Once Azure RBAC is enabled, you can access your Kubernetes cluster with the given permissions using either direct mode or proxy mode.
5460
- To access the Kubernetes cluster directly using the `az aksarc get-credentials` command, you need the **Microsoft.HybridContainerService/provisionedClusterInstances/listUserKubeconfig/action**, which is included in the **Azure Kubernetes Service Arc Cluster User** role permission.

0 commit comments

Comments
 (0)