Skip to content

Commit f5dcc92

Browse files
author
Cosmin Cojocar
committed
Update the configuration steps in the README
1 parent 86df816 commit f5dcc92

File tree

1 file changed

+16
-11
lines changed
  • staging/src/k8s.io/client-go/plugin/pkg/client/auth/azure

1 file changed

+16
-11
lines changed

staging/src/k8s.io/client-go/plugin/pkg/client/auth/azure/README.md

+16-11
Original file line numberDiff line numberDiff line change
@@ -5,39 +5,44 @@ This plugin provides an integration with Azure Active Directory device flow. If
55

66
## Usage
77

8-
1. Create an Azure native application following these [instructions](https://docs.microsoft.com/en-us/azure/active-directory/active-directory-app-registration)
8+
1. Create an Azure Active Directory native application for `apiserver` following these [instructions](https://docs.microsoft.com/en-us/azure/active-directory/active-directory-app-registration)
99

10-
Assign permissions to this application to access the `https://management.core.windows.net/"` audience.
10+
2. Create a second Azure Active Directory native application for `kubectl`
1111

12-
2. Configure the `apiserver` to use the Azure Active Directory as an OIDC provider with following options
12+
3. On `kubectl` application's configuration page in Azure portal grant permissions to `apiserver` application by clicking on *Required Permissions* then click the *Grant Permissions* button and introduce the ID of `apiserver` application
13+
14+
4. Configure the `apiserver` to use the Azure Active Directory as an OIDC provider with following options
1315

1416
```
15-
--oidc-client-id="spn:APPLICATION_ID" \
17+
--oidc-client-id="spn:APISERVER_APPLICATION_ID" \
1618
--oidc-issuer-url="https://sts.windows.net/TENANT_ID/"
1719
--oidc-username-claim="sub"
1820
```
1921

20-
* Replace `TENANT_ID` and `APPLICATION_ID` with your tenant ID.
22+
* Replace the `APISERVER_APPLICATION_ID` with the application ID of `apiserver` application
23+
* Replace `TENANT_ID` with your tenant ID.
2124

22-
3. Configure the `kubectl` to use the `azure` authentication provider with using the registered application
25+
5. Configure the `kubectl` to use the `azure` authentication provider
2326

2427
```
2528
kubectl config set-credentials "USER_NAME" --auth-provider=azure \
2629
--auth-provider-arg=environment=AzurePublicCloud \
2730
--auth-provider-arg=client-id=APPLICATION_ID \
28-
--auth-provider-arg=tenant-id=TENANT_ID
31+
--auth-provider-arg=tenant-id=TENANT_ID \
32+
--auth-provider-arg=apiserver-id=APISERVER_APPLICATION_ID
2933
```
3034

3135
* Supported environments: `AzurePublicCloud`, `AzureUSGovernmentCloud`, `AzureChinaCloud`, `AzureGermanCloud`
32-
* Replace `USER_NAME`, `APPLICATION_ID` and `TENANT_ID` with the values of the registered application.
36+
* Replace `USER_NAME` and `TENANT_ID` with your user name and tenant ID
37+
* Replace `APPLICATION_ID` with the application ID of your`kubectl` application ID
38+
* Replace `APISERVER_APPLICATION_ID` with the application ID of your `apiserver` application ID
3339

34-
4. The access token is acquired when first `kubectl` command is executed
40+
6. The access token is acquired when first `kubectl` command is executed
3541

3642
```
3743
kubeclt get pods
3844
3945
To sign in, use a web browser to open the page https://aka.ms/devicelogin and enter the code DEC7D48GA to authenticate.
4046
```
4147

42-
* After signing in a web browser, the tokens are stored in the configuration, which will be used when executing next commands.
43-
48+
* After signing in a web browser, the token is stored in the configuration, and it will be reused when executing next commands.

0 commit comments

Comments
 (0)