Click here to Skip to main content
15,883,901 members
Articles / Containers / Kubernetes

Operation and Maintenance of AKS Applications

Rate me:
Please Sign up or sign in to vote.
0.00/5 (No votes)
24 Apr 2019CPOL8 min read 8K  
This article shows you how to secure your AKS cluster with role-based security by leveraging Azure Active Directory as the authentication provider.

Views

Daily Counts

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


Written By
United Kingdom United Kingdom
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals.

Working towards that vision, we have published over 5000 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools.

Comments and Discussions