Skip to content

Commit 0a527bd

Browse files
authored
Update trusted-access-feature.md
1 parent ba30dc2 commit 0a527bd

1 file changed

Lines changed: 13 additions & 5 deletions

File tree

articles/aks/trusted-access-feature.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: schaffererin
1212

1313
Many Azure services that integrate with Azure Kubernetes Service (AKS) need access to the Kubernetes API server. To avoid granting these services admin access or making your AKS clusters public for network access, you can use the AKS Trusted Access feature.
1414

15-
This feature gives services secure access to AKS and Kubernetes via the Azure back end without requiring a private endpoint. Instead of relying on identities that have [Microsoft Entra](../active-directory/fundamentals/active-directory-whatis.md) permissions, this feature can use your system-assigned managed identity to authenticate with the managed services and applications that you want to use with your AKS clusters.
15+
This feature gives services secure access to AKS and Kubernetes by using the Azure back end without requiring a private endpoint. Instead of relying on identities that have [Microsoft Entra](../active-directory/fundamentals/active-directory-whatis.md) permissions, this feature can use your system-assigned managed identity to authenticate with the managed services and applications that you want to use with your AKS clusters.
1616

1717
This article shows you how to get secure access for your Azure services to your Kubernetes API server in AKS by using Trusted Access.
1818

@@ -91,7 +91,11 @@ After you confirm which role to use, use the Azure CLI to create a Trusted Acces
9191
# Create a Trusted Access role binding in an AKS cluster
9292
9393
az aks trustedaccess rolebinding create --resource-group <AKS resource group> --cluster-name <AKS cluster name> -n <role binding name> -s <connected service resource ID> --roles <roleName1, roleName2>
94+
```
95+
96+
Here's an example:
9497

98+
```azurecli
9599
# Sample command
96100
97101
az aks trustedaccess rolebinding create \
@@ -106,15 +110,19 @@ az aks trustedaccess rolebinding create \
106110
For an existing role binding that has an associated source service, you can update the role binding with new roles.
107111

108112
> [!NOTE]
109-
> The new role binding might take up to 5 minutes to take effect. The add-on manager updates clusters every 5 minutes. Before the new role binding takes effect, the existing role binding still works.
113+
> The add-on manager updates clusters every five minutes, so the new role binding might take up to five minutes to take effect. Before the new role binding takes effect, the existing role binding still works.
110114
>
111115
> You can use `az aks trusted access rolebinding list --name <role binding name> --resource-group <resource group>` to check the current role binding.
112116
113117
```azurecli
114118
# Update the RoleBinding command
115119
116120
az aks trustedaccess rolebinding update --resource-group <AKS resource group> --cluster-name <AKS cluster name> -n <existing role binding name> --roles <newRoleName1, newRoleName2>
121+
```
122+
123+
Here's an example:
117124

125+
```azurecli
118126
# Update the RoleBinding command with sample resource group, cluster, and roles
119127
120128
az aks trustedaccess rolebinding update \
@@ -125,15 +133,15 @@ az aks trustedaccess rolebinding update \
125133

126134
## Show a Trusted Access role binding
127135

128-
Use the Azure CLI to show a specific Trusted Access role binding:
136+
Show a specific Trusted Access role binding by using the `az aks trustedaccess rolebinding show` command:
129137

130138
```azurecli
131139
az aks trustedaccess rolebinding show --name <role binding name> --resource-group <AKS resource group> --cluster-name <AKS cluster name>
132140
```
133141

134142
## List all the Trusted Access role bindings for a cluster
135143

136-
Use the Azure CLI to list all the Trusted Access role bindings for a cluster:
144+
List all the Trusted Access role bindings for a cluster by using the `az aks trustedaccess rolebinding list` command:
137145

138146
```azurecli
139147
az aks trustedaccess rolebinding list --resource-group <AKS resource group> --cluster-name <AKS cluster name>
@@ -144,7 +152,7 @@ az aks trustedaccess rolebinding list --resource-group <AKS resource group> --cl
144152
> [!WARNING]
145153
> Deleting an existing Trusted Access role binding disconnects the Azure service from the AKS cluster.
146154
147-
Use the Azure CLI to delete an existing Trusted Access role binding:
155+
Delete an existing Trusted Access role binding by using the `az aks trustedaccess rolebinding delete` command:
148156

149157
```azurecli
150158
az aks trustedaccess rolebinding delete --name <role binding name> --resource-group <AKS resource group> --cluster-name <AKS cluster name>

0 commit comments

Comments
 (0)