Configuring Azure AKS access
This topic describes the required configurations within the Azure portal to allow PingOne Privilege to discover and manage your Azure Kubernetes Service (AKS) clusters.
The process involves enabling Microsoft Entra ID authentication on the AKS cluster and then assigning the necessary identity and access management (IAM) roles to the PingOne Privilege connector application.
Configuring authentication on the AKS cluster
First, configure your AKS cluster to use Microsoft Entra ID for authentication and to allow local accounts.
-
In the Azure portal, go to your Kubernetes services.
-
Select the desired AKS cluster in the list to open its management blade.
-
In the sidebar under Settings, select Cluster configuration.
-
In Authentication and authorization, select Microsoft Entra ID authentication with Azure RBAC.
-
Ensure the Kubernetes local accounts checkbox is enabled.
-
Click Apply to save the changes.
Assigning IAM roles to the connector app
Next, grant the PingOne Privilege connector application the required permissions to manage the cluster.
| These steps may not be necessary if the connector app already inherits these roles from its subscription-level permissions. |
-
From the AKS cluster’s management blade, go to Access control (IAM).
-
Click Add > Add role assignment.
-
In the Role tab, search for and select the Azure Kubernetes Service Cluster Admin Role. Click Next.
-
In the Members tab, click Select members.
-
Search for the
PingOne Privilege Connector App, select it, and click Select. -
Click Review + assign to complete the assignment.
-
Repeat steps 2-6 to assign the Azure Kubernetes Service RBAC Cluster Admin role to the same
PingOne Privilege Connector App.
Onboarding the cluster in PingOne Privilege
After completing the configuration in the Azure portal, rescan your Azure account in PingOne Privilege to discover the cluster.
-
In the PingOne Privilege admin console, go to Clouds.
-
Click the Azure icon, find your Azure account, and click More Info.
-
Go to the Resources tab and click Rescan.
After the rescan is complete, the AKS cluster will be available to manage under the Targets menu.