Skip to content

Commit ed29ac0

Browse files
committed
address typo errors
1 parent 4f89da2 commit ed29ac0

File tree

1 file changed

+8
-3
lines changed

1 file changed

+8
-3
lines changed

docs/docs/how-tos/configure-azure-rbac.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ nebari deploy
7373
By default, when rbac is `enabled`, Nebari will use the Azure AD group specified in
7474
`admin_group_object_ids` to grant full administrative permissions to the AKS cluster by
7575
automatically assigning the `Azure Kubernetes Service Cluster Admin Role` to the group.
76-
As seen bellow:
76+
As seen below:
7777

7878
```yaml
7979
apiVersion: rbac.authorization.k8s.io/v1
@@ -121,7 +121,7 @@ To demonstrate the capabilities of the RBAC and Azure AD integration, let’s si
121121

122122
2. **Assign Reader Role (or other limited roles)**
123123

124-
Assign a more restrictive role to the developer and SRE groups at the resource group level. For this example, we’ll use `Reader`:
124+
Assign a more restrictive role to the developer and SRE groups at the resource group level. For this example, we’ll use `Azure Kubernetes Service Cluster User Role`.
125125

126126
```bash
127127
az role assignment create \
@@ -130,6 +130,11 @@ To demonstrate the capabilities of the RBAC and Azure AD integration, let’s si
130130
--scope $AKS_ID
131131
```
132132

133+
::note
134+
For an extended list of [Azure built-in
135+
roles](https://learn.microsoft.com/en-us/azure/aks/manage-azure-rbac?tabs=azure-portal#aks-built-in-roles).
136+
::
137+
133138
3. **Map Azure AD Groups to Kubernetes RBAC**
134139

135140
Create or apply Role and RoleBinding resources for the `dev` namespace, assigning appropriate permissions.
@@ -181,7 +186,7 @@ To demonstrate the capabilities of the RBAC and Azure AD integration, let’s si
181186
```
182187

183188
::note
184-
This is just for testing and to serve as an exmaple, vvoid using passwords directly
189+
This is just for testing and to serve as an example, avoid using passwords directly
185190
in command-line operations instead.
186191
::
187192

0 commit comments

Comments
 (0)