Azure-docs: Limiting who can assume Admin

Created on 25 Jun 2018  ·  13Comments  ·  Source: MicrosoftDocs/azure-docs

What is the method that Microsoft is recommending, of limiting who can log into the cluster with the “—admin” flag? If my organization eventually rolls this out to more groups with access to Azure and AKS, we would like to limit who is able to log into the cluster as an admin. Currently, even with RBAC enabled, it seems that anyone is still able to just add a --admin flag to the get credentials command and assume admin (not good).


Document Details

Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.

assigned-to-author container-servicsvc doc-enhancement in-progress triaged

Most helpful comment

@jdogg89 - good question, please stand-by.

All 13 comments

@jdogg89 - good question, please stand-by.

I am still working on the exact steps, however it seems a custom Azure RBAC role can be created to limit access to the --admin based kubeconfig file.

We will get these steps published once fleshed out.

We are tracking in and internal system and will get the docs updated once resolved. I am closing this doc issue for the time being.

please-close

@jdogg89 We will now proceed to close this thread. If there are further questions regarding this matter, please reopen it and we will gladly continue the discussion.

I'm hanging on this one. How can I get updated when it is resolved ?

@jrhoward after some discussion with @iainfoulds, we want to keep this open until the technical resolution comes through.

@SaurabhSharma-MSFT / @MicahMcKittrick-MSFT can we open this back up - thanks.

in-progress

@jdogg89 We will now close this issue. If there are further questions regarding this matter, please reopen it and we will gladly continue the discussion.

@iainfoulds @neilpeterson @femsulu
Why was the issue closed?
What is the solution regarding this?

What is the fix? Closed #12409 and #10754 without stating exact fix, assuming the fix is updating below document.
https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations

I was working on same issue, blocking "--admin" using "/managedClusters/listClusterAdminCredential/action" which does not work as expected, created #13517

Is there a resolution to this issue......it seems a bit pointless going to the trouble of integrating AKS with Active Directory if we can't block users from issuing

az aks get-credentials --admin

Login to portal and browse to Subscriptions -> Accesscontrol(IAM) -> Roles. It was not properly communicated by Azure.

Azure Kubernetes Service Cluster User Role
Azure Kubernetes Service Cluster Admin Role

Thanks @praveendhac, that makes sense now!

Was this page helpful?
0 / 5 - 0 ratings