You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/trusted-access-feature.md
+13-5Lines changed: 13 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.author: schaffererin
12
12
13
13
Many Azure services that integrate with Azure Kubernetes Service (AKS) need access to the Kubernetes API server. To avoid granting these services admin access or making your AKS clusters public for network access, you can use the AKS Trusted Access feature.
14
14
15
-
This feature gives services secure access to AKS and Kubernetes via the Azure back end without requiring a private endpoint. Instead of relying on identities that have [Microsoft Entra](../active-directory/fundamentals/active-directory-whatis.md) permissions, this feature can use your system-assigned managed identity to authenticate with the managed services and applications that you want to use with your AKS clusters.
15
+
This feature gives services secure access to AKS and Kubernetes by using the Azure back end without requiring a private endpoint. Instead of relying on identities that have [Microsoft Entra](../active-directory/fundamentals/active-directory-whatis.md) permissions, this feature can use your system-assigned managed identity to authenticate with the managed services and applications that you want to use with your AKS clusters.
16
16
17
17
This article shows you how to get secure access for your Azure services to your Kubernetes API server in AKS by using Trusted Access.
18
18
@@ -91,7 +91,11 @@ After you confirm which role to use, use the Azure CLI to create a Trusted Acces
91
91
# Create a Trusted Access role binding in an AKS cluster
92
92
93
93
az aks trustedaccess rolebinding create --resource-group <AKS resource group> --cluster-name <AKS cluster name> -n <role binding name> -s <connected service resource ID> --roles <roleName1, roleName2>
94
+
```
95
+
96
+
Here's an example:
94
97
98
+
```azurecli
95
99
# Sample command
96
100
97
101
az aks trustedaccess rolebinding create \
@@ -106,15 +110,19 @@ az aks trustedaccess rolebinding create \
106
110
For an existing role binding that has an associated source service, you can update the role binding with new roles.
107
111
108
112
> [!NOTE]
109
-
> The new role binding might take up to 5 minutes to take effect. The add-on manager updates clusters every 5 minutes. Before the new role binding takes effect, the existing role binding still works.
113
+
> The add-on manager updates clusters every five minutes, so the new role binding might take up to five minutes to take effect. Before the new role binding takes effect, the existing role binding still works.
110
114
>
111
115
> You can use `az aks trusted access rolebinding list --name <role binding name> --resource-group <resource group>` to check the current role binding.
112
116
113
117
```azurecli
114
118
# Update the RoleBinding command
115
119
116
120
az aks trustedaccess rolebinding update --resource-group <AKS resource group> --cluster-name <AKS cluster name> -n <existing role binding name> --roles <newRoleName1, newRoleName2>
121
+
```
122
+
123
+
Here's an example:
117
124
125
+
```azurecli
118
126
# Update the RoleBinding command with sample resource group, cluster, and roles
119
127
120
128
az aks trustedaccess rolebinding update \
@@ -125,15 +133,15 @@ az aks trustedaccess rolebinding update \
125
133
126
134
## Show a Trusted Access role binding
127
135
128
-
Use the Azure CLI to show a specific Trusted Access role binding:
136
+
Show a specific Trusted Access role binding by using the `az aks trustedaccess rolebinding show` command:
129
137
130
138
```azurecli
131
139
az aks trustedaccess rolebinding show --name <role binding name> --resource-group <AKS resource group> --cluster-name <AKS cluster name>
132
140
```
133
141
134
142
## List all the Trusted Access role bindings for a cluster
135
143
136
-
Use the Azure CLI to list all the Trusted Access role bindings for a cluster:
144
+
List all the Trusted Access role bindings for a cluster by using the `az aks trustedaccess rolebinding list` command:
137
145
138
146
```azurecli
139
147
az aks trustedaccess rolebinding list --resource-group <AKS resource group> --cluster-name <AKS cluster name>
@@ -144,7 +152,7 @@ az aks trustedaccess rolebinding list --resource-group <AKS resource group> --cl
144
152
> [!WARNING]
145
153
> Deleting an existing Trusted Access role binding disconnects the Azure service from the AKS cluster.
146
154
147
-
Use the Azure CLI to delete an existing Trusted Access role binding:
155
+
Delete an existing Trusted Access role binding by using the `az aks trustedaccess rolebinding delete` command:
148
156
149
157
```azurecli
150
158
az aks trustedaccess rolebinding delete --name <role binding name> --resource-group <AKS resource group> --cluster-name <AKS cluster name>
0 commit comments