在 Azure Kubernetes 服务中禁用 Azure Active Directory RBAC

Disabling Azure Active Directory RBAC in Azure Kubernetes Service

是否可以在 Azure Kubernetes 服务中暂时禁用 Azure Active Directory RBAC?我问的原因是因为我们无法设置自动化任务(如持续集成),因为针对 kubectl 的身份验证现在需要人工干预才能完成设备代码身份验证 - 我有 regarding that. Perhaps even just disabling Kubernetes RBAC will bypass the need to authenticate with AD? I would do this until a solution to the issue 可用。

尽管没有文档明确说明您不能禁用现有 AKS 群集的 RBAC。但是显示enabling role-based access control (RBAC) on existing clusters isn't supported at this time. In my opinion, it also means that you cannot disable the RBAC on existing AKS cluster. And it seems there is no way to achieve it, no matter Azure CLI, PowerShell or REST API.

我认为 RBAC 是 AKS 集群的设置,现在创建后无法更改。我们可以期待它在未来会有所改变。希望对您有所帮助。