Skip to content

Latest commit

 

History

History
34 lines (28 loc) · 1.82 KB

how-to-managed-cluster-azure-active-directory-client.md

File metadata and controls

34 lines (28 loc) · 1.82 KB
title description ms.topic ms.author author ms.service services ms.date
How to configure Azure Service Fabric managed cluster for Microsoft Entra client access
Learn how to configure an Azure Service Fabric managed cluster for Microsoft Entra client access
how-to
tomcassidy
tomvcassidy
service-fabric
service-fabric
07/11/2022

How to configure Azure Service Fabric managed cluster for Active Directory client access

Cluster security is configured when the cluster is first set up and can't be changed later. Before setting up a cluster, read Service Fabric cluster security scenarios. In Azure, Service Fabric uses x509 certificate to secure your cluster and its endpoints, authenticate clients, and encrypt data. Microsoft Entra ID is also recommended to secure access to management endpoints. Microsoft Entra tenants and users must be created before creating the cluster. For more information, read Set up Microsoft Entra ID to authenticate clients.

You add the Microsoft Entra configuration to a cluster resource manager template by referencing the key vault that contains the certificate keys. Add those Microsoft Entra parameters and values in a Resource Manager template parameters file (azuredeploy.parameters.json).

Note

On Microsoft Entra tenants and users must be created before creating the cluster. For more information, read Set up Microsoft Entra ID to authenticate clients.

{
"type": "Microsoft.ServiceFabric/managedClusters",
"apiVersion": "2022-01-01",
"properties": {
      "azureActiveDirectory": {
      "tenantId": "[parameters('aadTenantId')]",
      "clusterApplication": "[parameters('aadClusterApplicationId')]",
      "clientApplication": "[parameters('aadClientApplicationId')]"
    },
   }
}