You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/docs/how-tos/configure-azure-rbac.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ nebari deploy
73
73
By default, when rbac is `enabled`, Nebari will use the Azure AD group specified in
74
74
`admin_group_object_ids`to grant full administrative permissions to the AKS cluster by
75
75
automatically assigning the `Azure Kubernetes Service Cluster Admin Role` to the group.
76
-
As seen bellow:
76
+
As seen below:
77
77
78
78
```yaml
79
79
apiVersion: rbac.authorization.k8s.io/v1
@@ -121,7 +121,7 @@ To demonstrate the capabilities of the RBAC and Azure AD integration, let’s si
121
121
122
122
2. **Assign Reader Role (or other limited roles)**
123
123
124
-
Assign a more restrictive role to the developer and SRE groups at the resource group level. For this example, we’ll use `Reader`:
124
+
Assign a more restrictive role to the developer and SRE groups at the resource group level. For this example, we’ll use `Azure Kubernetes Service Cluster User Role`.
125
125
126
126
```bash
127
127
az role assignment create \
@@ -130,6 +130,11 @@ To demonstrate the capabilities of the RBAC and Azure AD integration, let’s si
0 commit comments