DEV Community 👩‍💻👨‍💻

Mike Levan
Mike Levan

Posted on

Use Azure Active Directory For RBAC In AKS

In any Kubernetes environment, whether it’s in the cloud or on-prem, there’s going to come a time when you’ll need to have users and other engineers authenticate to the cluster. Whether they need to deploy Kubernetes resources or just list/read them, they’ll need a user to authenticate.

Once authenticated, the user then needs authorization permissions to perform actions on the clustee.

How is authentication and authorization done in Azure? By using Azure Active Directory for RBAC.

In this blog post, you’ll learn how to set up IAM permissions in AKS to utilize Azure Active Directory for a Kubernetes cluster.

What Is Active Directory?

Many large organizations do a lot of things right, but they’re also “known” for a specific tool or technology that they’ve created. Microsoft, known for many things, is especially known for Active Directory.

Active Directory has been the defacto standard for creating authentication and authorization in Windows environments for years. Every Systems Administrator that has ever managed a Windows Server has used Active directory in one way or another. If you’ve never used Active Directory, but have logged into a work computer with a domain account, guess what? You’ve used Active Directory as well.

Because Active Directory has been vetted out for so many years, it’s no wonder that one have Azures most popular services in Active Active Directory, which is the Active Directory that most Sysadmins know, but in the cloud.

So, what is Active Directory?

Essentially, it allows you to log in and perform certain actions on a computer/server. Depending on your permissions, you can do things like write to files, read files, create servers, and any other type of action that can be taken.

Active Directory goes far more in-depth, but this is the high level.

Create An AKS Cluster

Before you can start utilizing Azure Active Directory with AKS, you’ll need an AKS cluster. The code below will create a basic AKS cluster that you can use to test out Azure Active Directory.

If you don’t use Terraform, there are many other methods. Feel free to also use the UI, but as always, it’s recommended to define your infrastructure as code.

First, specify the Azure provider for Terraform

terraform {
  required_providers {
    azurerm = {
      source  = "hashicorp/azurerm"
      version = "=3.0.0"
    }
  }
}

provider "azurerm" {
  features {}
}
Enter fullscreen mode Exit fullscreen mode

Next, specify the AKS resource which will create an AKS cluster with one worker node using an

A-Series VM to keep costs as low as possible for testing.

resource "azurerm_kubernetes_cluster" "k8squickstart" {
  name                = "akstest"
  location            = "eastus"
  resource_group_name = "resource_group_name
  dns_prefix          = "${var.name}-dns01"
  network_profile {
  network_plugin = "azure"
  network_policy = "azure"
}

  default_node_pool {
    name       = "default"
    node_count = 1
    vm_size    = "Standard_A2_v2"
  }

  identity {
    type = "SystemAssigned"
  }

  tags = {
    Environment = "Dev"
  }
}
Enter fullscreen mode Exit fullscreen mode

Save the code to a [main.tf](http://main.tf) file and run it with:

  • terraform plan
  • terraform apply

Setting Up Azure Active Directory

As you learned about in the What Is Active Directory? section above, Active Directory is an authentication and authorization tool that you can use to authenticate to servers and perform actions. Because it’s an OIDC provider, Azure Active Directory can be used in Azure environments, like AKS, to manage authentication and authorization.

This is a big deal for Kubernetes because out of the box, Kubernetes doesn’t have an authentication method. It does have an authorization method (RBAC), but as every engineers knows that’s worked with it, it’s a major pain to maintain.

Luckily, theres not much that you need to do to set up Azure Active Directory as it’s always a service in Azure, so it’s “on”.

First, log into the Azure portal.

Once you’re logged in, search for “active directory” and click on the Azure Active Directory service.

Image description

Under Manage, click on Users.

Image description

Click the + New user dropdown and click Create new user.

Image description

Fill in some information about the new user you’re creating and then click the blue Create button.

Image description

You should now see that the user has been created.

Image description

Now that the authentication piece is complete, you can work on the authorization piece, which is in the next section.

Configuring Azure AD For AKS

For this section, you’ll configure Azure Active Directory authorization for the user that you created in the previous section via AKS.

In Azure, go to your AKS cluster and click on Access control (IAM).

Image description

Click the + Add button and then choose the Add role assignment option.

Image description

You’ll see a full list of RBAC options. For the purposes of this blog post, choose the Reader option and then click the Members tab.

Image description

Click the + Select members button and then choose the new user that you created in the previous section.

Image description

Once complete, click the Review + assign button.

Image description

The new user has now been added to the AKS cluster as a Reader.

That’s how you can get started using RBAC with Azure Active Directory on AKS. Thanks for reading!

Top comments (0)

🔍 If you came here from Google, why not take a look at some of our top posts?