Just-in-Time Access to Azure Kubernetes Service
Published Mar 02 2021 01:42 PM 7,218 Views
Microsoft

Historically, we could assign an employee to an administrative role through the Azure portal or through Windows PowerShell and that employee would be a permanent administrator; their elevated access would remain active in the assigned role. Azure AD PIM introduced the concept of permanent and eligible administrators in Azure AD and Azure. Permanent administrators have persistent elevated role connections; whereas, eligible administrators have privileged access only when they need it. The eligible administrator role is inactive until the employee needs access, then they complete an activation process and become an active administrator for a set amount of time. 

 

For example, leverage Just-in-Time access to "Assign" an Administrator access to the CLI to run commands against the cluster during the allotted timeframe.

 

MichaelWithrow_0-1614720909010.png

 

For more information please refer to the document below to enable Just-in-Time access for your administrators.

 

Use Azure AD in Azure Kubernetes Service - Azure Kubernetes Service | Microsoft Docs

Version history
Last update:
‎Mar 04 2021 04:00 PM
Updated by: