Skip to content

Commit f65266d

Browse files
committed
final Trusted Access edits
1 parent 41e68a2 commit f65266d

1 file changed

Lines changed: 20 additions & 18 deletions

File tree

articles/aks/trusted-access-feature.md

Lines changed: 20 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Give Azure resources access to Azure Kubernetes Service clusters by using Trusted Access (preview)
2+
title: Get secure resource access to AKS by using Trusted Access
33
description: Learn how to use the Trusted Access feature to give Azure resources access to Azure Kubernetes Service (AKS) clusters.
44
author: schaffererin
55
ms.topic: article
@@ -8,26 +8,26 @@ ms.date: 12/04/2023
88
ms.author: schaffererin
99
---
1010

11-
# Give Azure resources access to Azure Kubernetes Service clusters by using Trusted Access (preview)
11+
# Get secure access for Azure resources in Azure Kubernetes Service by using Trusted Access (preview)
1212

1313
Many Azure services that integrate with Azure Kubernetes Service (AKS) need access to the Kubernetes API server. To avoid granting these services admin access or making your AKS clusters public for network access, you can use the AKS Trusted Access feature.
1414

15-
This feature gives services secure access to AKS and Kubernetes via the Azure back end without requiring a private endpoint. Instead of relying on identities that have [Microsoft Entra ID](../active-directory/fundamentals/active-directory-whatis.md) permissions, this feature can use your system-assigned managed identity to authenticate with the managed services and applications that you want to use on top of AKS.
15+
This feature gives services secure access to AKS and Kubernetes via the Azure back end without requiring a private endpoint. Instead of relying on identities that have [Microsoft Entra](../active-directory/fundamentals/active-directory-whatis.md) permissions, this feature can use your system-assigned managed identity to authenticate with the managed services and applications that you want to use with your AKS clusters.
1616

17-
This article shows you how to enable secure access from your Azure services to your Kubernetes API server in AKS by using Trusted Access.
17+
This article shows you how to get secure access for your Azure services to your Kubernetes API server in AKS by using Trusted Access.
1818

1919
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
2020

2121
> [!NOTE]
22-
> The Trusted Access API is generally available. We provide general availability (GA) support for the Azure CLI, but it's still in preview and requires the aks-preview extension.
22+
> The Trusted Access API is generally available. We provide general availability (GA) support for the Azure CLI, but it's still in preview and requires using the aks-preview extension.
2323
2424
## Trusted Access feature overview
2525

2626
Trusted Access addresses the following scenarios:
2727

28-
* Azure services might not be able to access the Kubernetes API server if an authorized IP range is set or in a private cluster unless you implement a private endpoint access model.
28+
* If an authorized IP range is set or in a private cluster, Azure services might not be able to access the Kubernetes API server unless you implement a private endpoint access model.
2929

30-
* Providing admin access to the Kubernetes API to an Azure service doesn't follow the least privilege access best practice and can lead to privilege escalations or risk of credentials leakage. For example, you might have to implement high-privileged service-to-service permissions, and they aren't ideal in an audit review.
30+
* Giving an Azure service admin access to the Kubernetes API doesn't follow the least privilege access best practice and can lead to privilege escalations or risk of credentials leakage. For example, you might have to implement high-privileged service-to-service permissions, and they aren't ideal in an audit review.
3131

3232
You can use Trusted Access to give explicit consent to your system-assigned managed identity of allowed resources to access your AKS clusters by using an Azure resource called a *role binding*. Your Azure resources access AKS clusters through the AKS regional gateway via system-assigned managed identity authentication. The appropriate Kubernetes permissions are assigned via an Azure resource called a *role*. Through Trusted Access, you can access AKS clusters with different configurations including but not limited to [private clusters](private-clusters.md), [clusters that have local accounts turned off](manage-local-accounts-managed-azure-ad.md#disable-local-accounts), [Microsoft Entra clusters](azure-ad-integration-cli.md), and [authorized IP range clusters](api-server-authorized-ip-ranges.md).
3333

@@ -37,10 +37,12 @@ You can use Trusted Access to give explicit consent to your system-assigned mana
3737
* Resource types that support [system-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md).
3838
* If you're using the Azure CLI, the aks-preview extension version 0.5.74 or later is required.
3939
* To learn what roles to use in different scenarios, see these articles:
40-
* [Azure Machine Learning access to AKS clusters with special configurations](https://github.com/Azure/AML-Kubernetes/blob/master/docs/azureml-aks-ta-support.md).
40+
* [Azure Machine Learning access to AKS clusters with special configurations](https://github.com/Azure/AML-Kubernetes/blob/master/docs/azureml-aks-ta-support.md)
4141
* [What is Azure Kubernetes Service backup?][aks-azure-backup]
4242
* [Turn on an agentless container posture](../defender-for-cloud/concept-agentless-containers.md)
4343

44+
## Get started
45+
4446
First, install the aks-preview extension:
4547

4648
```azurecli
@@ -79,16 +81,16 @@ In the same subscription as the Azure resource that you want to access the clust
7981

8082
## Select the required Trusted Access roles
8183

82-
The roles that you select depend on the different Azure services. These services help create roles and role bindings that build the connection from the Azure service to AKS.
84+
The roles that you select depend on the Azure services that you want to access the AKS cluster. Azure services help create roles and role bindings that build the connection from the Azure service to AKS.
8385

8486
## Create a Trusted Access role binding
8587

86-
After you confirm which role to use, use the Azure CLI to create a Trusted Access role binding in an AKS cluster. The role binding associates your selected role with the Azure service.
88+
After you confirm which role to use, use the Azure CLI to create a Trusted Access role binding in the AKS cluster. The role binding associates your selected role with the Azure service.
8789

8890
```azurecli
8991
# Create a Trusted Access role binding in an AKS cluster
9092
91-
az aks trustedaccess rolebinding create --resource-group <AKS resource group> --cluster-name <AKS cluster name> -n <rolebinding name> -s <connected service resource ID> --roles <roleName1, roleName2>
93+
az aks trustedaccess rolebinding create --resource-group <AKS resource group> --cluster-name <AKS cluster name> -n <role binding name> -s <connected service resource ID> --roles <roleName1, roleName2>
9294
9395
# Sample command
9496
@@ -99,19 +101,19 @@ az aks trustedaccess rolebinding create \
99101
--roles Microsoft.Compute/virtualMachineScaleSets/test-node-reader,Microsoft.Compute/virtualMachineScaleSets/test-admin
100102
```
101103

102-
## Update an existing Trusted Access role binding with new roles
104+
## Update an existing Trusted Access role binding
103105

104106
For an existing role binding that has an associated source service, you can update the role binding with new roles.
105107

106108
> [!NOTE]
107109
> The new role binding might take up to 5 minutes to take effect. The add-on manager updates clusters every 5 minutes. Before the new role binding takes effect, the existing role binding still works.
108110
>
109-
> You can use `az aks trusted access rolebinding list --name <rolebinding name> --resource-group <resource group>` to check the current role binding.
111+
> You can use `az aks trusted access rolebinding list --name <role binding name> --resource-group <resource group>` to check the current role binding.
110112
111113
```azurecli
112114
# Update the RoleBinding command
113115
114-
az aks trustedaccess rolebinding update --resource-group <AKS resource group> --cluster-name <AKS cluster name> -n <existing rolebinding name> --roles <newRoleName1, newRoleName2>
116+
az aks trustedaccess rolebinding update --resource-group <AKS resource group> --cluster-name <AKS cluster name> -n <existing role binding name> --roles <newRoleName1, newRoleName2>
115117
116118
# Update the RoleBinding command with sample resource group, cluster, and roles
117119
@@ -126,7 +128,7 @@ az aks trustedaccess rolebinding update \
126128
Use the Azure CLI to show a specific Trusted Access role binding:
127129

128130
```azurecli
129-
az aks trustedaccess rolebinding show --name <rolebinding name> --resource-group <AKS resource group> --cluster-name <AKS cluster name>
131+
az aks trustedaccess rolebinding show --name <role binding name> --resource-group <AKS resource group> --cluster-name <AKS cluster name>
130132
```
131133

132134
## List all the Trusted Access role bindings for a cluster
@@ -140,18 +142,18 @@ az aks trustedaccess rolebinding list --resource-group <AKS resource group> --cl
140142
## Delete a Trusted Access role binding for a cluster
141143

142144
> [!WARNING]
143-
> Deleting an existing Trusted Access role binding disconnects the AKS cluster from the Azure service.
145+
> Deleting an existing Trusted Access role binding disconnects the Azure service from the AKS cluster.
144146
145147
Use the Azure CLI to delete an existing Trusted Access role binding:
146148

147149
```azurecli
148-
az aks trustedaccess rolebinding delete --name <rolebinding name> --resource-group <AKS resource group> --cluster-name <AKS cluster name>
150+
az aks trustedaccess rolebinding delete --name <role binding name> --resource-group <AKS resource group> --cluster-name <AKS cluster name>
149151
```
150152

151153
## Related content
152154

153155
* [Deploy and manage cluster extensions for AKS](cluster-extensions.md)
154-
* [Deploy the Azure Machine Learning extension on an AKS or Arc Kubernetes cluster](../machine-learning/how-to-deploy-kubernetes-extension.md)
156+
* [Deploy the Azure Machine Learning extension on an AKS or Azure Arc&#8211;enabled Kubernetes cluster](../machine-learning/how-to-deploy-kubernetes-extension.md)
155157
* [Deploy Azure Backup on an AKS cluster](../backup/azure-kubernetes-service-backup-overview.md)
156158
* [Set agentless container posture in Microsoft Defender for Cloud for an AKS cluster](../defender-for-cloud/concept-agentless-containers.md)
157159

0 commit comments

Comments
 (0)