What is the method that Microsoft is recommending, of limiting who can log into the cluster with the “—admin” flag? If my organization eventually rolls this out to more groups with access to Azure and AKS, we would like to limit who is able to log into the cluster as an admin. Currently, even with RBAC enabled, it seems that anyone is still able to just add a --admin flag to the get credentials command and assume admin (not good).
⚠ Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.
@jdogg89 - good question, please stand-by.
I am still working on the exact steps, however it seems a custom Azure RBAC role can be created to limit access to the --admin
based kubeconfig file.
We will get these steps published once fleshed out.
We are tracking in and internal system and will get the docs updated once resolved. I am closing this doc issue for the time being.
@jdogg89 We will now proceed to close this thread. If there are further questions regarding this matter, please reopen it and we will gladly continue the discussion.
I'm hanging on this one. How can I get updated when it is resolved ?
@jrhoward after some discussion with @iainfoulds, we want to keep this open until the technical resolution comes through.
@SaurabhSharma-MSFT / @MicahMcKittrick-MSFT can we open this back up - thanks.
@jdogg89 We will now close this issue. If there are further questions regarding this matter, please reopen it and we will gladly continue the discussion.
@iainfoulds @neilpeterson @femsulu
Why was the issue closed?
What is the solution regarding this?
What is the fix? Closed #12409 and #10754 without stating exact fix, assuming the fix is updating below document.
https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
I was working on same issue, blocking "--admin" using "/managedClusters/listClusterAdminCredential/action" which does not work as expected, created #13517
Is there a resolution to this issue......it seems a bit pointless going to the trouble of integrating AKS with Active Directory if we can't block users from issuing
az aks get-credentials --admin
Login to portal and browse to Subscriptions -> Accesscontrol(IAM) -> Roles
. It was not properly communicated by Azure.
Azure Kubernetes Service Cluster User Role
Azure Kubernetes Service Cluster Admin Role
Thanks @praveendhac, that makes sense now!
Most helpful comment
@jdogg89 - good question, please stand-by.