forked from mspnp/aks-baseline-regulated
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcluster-rbac.yaml
26 lines (26 loc) · 931 Bytes
/
cluster-rbac.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
# Mapping k8s user facing roles to AAD groups: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
#apiVersion: rbac.authorization.k8s.io/v1
#kind: ClusterRoleBinding
#metadata:
# name: aksrbac-cluster-admin
#roleRef:
# apiGroup: rbac.authorization.k8s.io
# kind: ClusterRole
# name: cluster-admin
#subjects:
#- apiGroup: rbac.authorization.k8s.io
# kind: Group
# name: <replace-with-an-aad-group-object-id-for-this-cluster-wide-maximally-privileged-admin-role -- consider mapping all cluster-admin roles via the cluster's arm template instead of here.>
#---
#apiVersion: rbac.authorization.k8s.io/v1
#kind: ClusterRoleBinding
#metadata:
# name: aksrbac-cluster-viewer
#roleRef:
# apiGroup: rbac.authorization.k8s.io
# kind: ClusterRole
# name: view
#subjects:
#- apiGroup: rbac.authorization.k8s.io
# kind: Group
# name: <replace-with-an-aad-group-object-id-for-this-cluster-wide-view-role>