Azure Active Directory plugin for client authentication
This plugin provides an integration with Azure Active Directory device flow. If no tokens are present in the kubectl configuration, it will prompt a device code which can be used to login in a browser. After login it will automatically fetch the tokens and stored them in the kubectl configuration. In addition it will refresh and update the tokens in configuration when expired.
Usage
-
Create an Azure Active Directory Web App / API application for
apiserverfollowing these instructions -
Create a second Azure Active Directory native application for
kubectl -
On
kubectlapplication's configuration page in Azure portal grant permissions toapiserverapplication by clicking on Required Permissions, click the Add button and search for the apiserver application created in step 1. Select "Access apiserver" under the DELEGATED PERMISSIONS. Once added click the Grant Permissions button to apply the changes -
Configure the
apiserverto use the Azure Active Directory as an OIDC provider with following options--oidc-client-id="spn:APISERVER_APPLICATION_ID" \ --oidc-issuer-url="https://sts.windows.net/TENANT_ID/" --oidc-username-claim="sub"- Replace the
APISERVER_APPLICATION_IDwith the application ID ofapiserverapplication - Replace
TENANT_IDwith your tenant ID.
- Replace the
-
Configure the
kubectlto use theazureauthentication providerkubectl config set-credentials "USER_NAME" --auth-provider=azure \ --auth-provider-arg=environment=AzurePublicCloud \ --auth-provider-arg=client-id=APPLICATION_ID \ --auth-provider-arg=tenant-id=TENANT_ID \ --auth-provider-arg=apiserver-id=APISERVER_APPLICATION_ID- Supported environments:
AzurePublicCloud,AzureUSGovernmentCloud,AzureChinaCloud,AzureGermanCloud - Replace
USER_NAMEandTENANT_IDwith your user name and tenant ID - Replace
APPLICATION_IDwith the application ID of yourkubectlapplication ID - Replace
APISERVER_APPLICATION_IDwith the application ID of yourapiserverapplication ID
- Supported environments:
-
The access token is acquired when first
kubectlcommand is executed
kubectl get pods
To sign in, use a web browser to open the page https://aka.ms/devicelogin and enter the code DEC7D48GA to authenticate.
- After signing in a web browser, the token is stored in the configuration, and it will be reused when executing next commands.