Skip to content

Latest commit

 

History

History
83 lines (42 loc) · 3.56 KB

IntegrateAzureActiveDirectory.md

File metadata and controls

83 lines (42 loc) · 3.56 KB

Integrate Azure Active Directory with Azure Kubernetes Service

Instructions to set up Active Directory for user authentication are captured here for your convenience.

Select Azure Active Directory > App registrations > New application registration.

az

Give the application a name, select Web app / API for the application type, and enter any URI formatted value for Sign-on URL. Select Create when done.

az

Select edit Manifest.

az

Edit the groupMembershipClaims value to "All". Save the updates once complete.

az

Back on the Azure AD application, select Settings > Keys.

az

Add a key description, select an expiration deadline, and select Save. Take note of the key value. When deploying an Azure AD enabled AKS cluster, this value is referred to as the Server application secret.

az

Return to the Azure AD application, select Settings > Required permissions > Add > Select an API > Microsoft Graph > Select.

az

Under APPLICATION PERMISSIONS place a check next to Read directory data.

az

Under DELEGATED PERMISSIONS, place a check next to Sign in and read user profile and Read directory data. Save the updates once done.

az

Choose Microsoft Graph from the list of APIs, then select Grant Permissions. This step will fail if the current account is not a tenant admin.

az

Return to the application and take note of the Application ID. When deploying an Azure AD-enabled AKS cluster, this value is referred to as the Server application ID.

az

Select Azure Active Directory > App registrations > New application registration.

az

Give the application a name, select Native for the application type, and enter any URI formatted value for Redirect URI. Select Create when done.

az

From the Azure AD application, select Settings > Required permissions > Add > Select an API and search for the name of the server application created in the last step of this document.

az

Place a check mark next to the application and click Select.

az

Select your server API from the list and then choose Grant Permissions.

az

Back on the AD application, take note of the Application ID. When deploying an Azure AD-enabled AKS cluster, this value is referred to as the Client application ID.

az

Finally, get the ID of your Azure tenant. This value is also used when deploying the AKS cluster.

From the Azure portal, select Azure Active Directory > Properties and take note of the Directory ID. When deploying an Azure AD-enabled AKS cluster, this value is referred to as the Tenant ID.

az