0
# Trusted Access
1
2
Trusted access role bindings and role management for secure integration with other Azure services and custom applications. This feature allows AKS clusters to grant specific Azure services secure access to cluster resources without requiring custom credential management.
3
4
## Capabilities
5
6
### Trusted Access Role Binding Management
7
8
Create and manage role bindings that grant trusted Azure services access to AKS cluster resources.
9
10
```python { .api }
11
def get(
12
resource_group_name: str,
13
resource_name: str,
14
trusted_access_role_binding_name: str,
15
**kwargs
16
) -> TrustedAccessRoleBinding:
17
"""
18
Get a trusted access role binding.
19
20
Parameters:
21
- resource_group_name (str): The name of the resource group
22
- resource_name (str): The name of the managed cluster
23
- trusted_access_role_binding_name (str): The name of the trusted access role binding
24
25
Returns:
26
TrustedAccessRoleBinding: The trusted access role binding
27
"""
28
29
def begin_create_or_update(
30
resource_group_name: str,
31
resource_name: str,
32
trusted_access_role_binding_name: str,
33
parameters: TrustedAccessRoleBinding,
34
**kwargs
35
) -> TrustedAccessRoleBinding:
36
"""
37
Create or update a trusted access role binding.
38
39
Parameters:
40
- resource_group_name (str): The name of the resource group
41
- resource_name (str): The name of the managed cluster
42
- trusted_access_role_binding_name (str): The name of the trusted access role binding
43
- parameters (TrustedAccessRoleBinding): The role binding specification
44
45
Returns:
46
TrustedAccessRoleBinding: The created or updated role binding
47
"""
48
49
def begin_delete(
50
resource_group_name: str,
51
resource_name: str,
52
trusted_access_role_binding_name: str,
53
**kwargs
54
) -> None:
55
"""
56
Delete a trusted access role binding.
57
58
Parameters:
59
- resource_group_name (str): The name of the resource group
60
- resource_name (str): The name of the managed cluster
61
- trusted_access_role_binding_name (str): The name of the trusted access role binding
62
"""
63
64
def list_trusted_access_role_bindings(
65
resource_group_name: str,
66
resource_name: str,
67
**kwargs
68
) -> ItemPaged[TrustedAccessRoleBinding]:
69
"""
70
List trusted access role bindings for a cluster.
71
72
Parameters:
73
- resource_group_name (str): The name of the resource group
74
- resource_name (str): The name of the managed cluster
75
76
Returns:
77
ItemPaged[TrustedAccessRoleBinding]: Paginated list of role bindings
78
"""
79
```
80
81
### Trusted Access Role Discovery
82
83
Discover available trusted access roles that can be assigned to Azure services.
84
85
```python { .api }
86
def list_trusted_access_roles(location: str, **kwargs) -> ItemPaged[TrustedAccessRole]:
87
"""
88
List available trusted access roles for a location.
89
90
Parameters:
91
- location (str): The Azure location
92
93
Returns:
94
ItemPaged[TrustedAccessRole]: Paginated list of available roles
95
"""
96
```
97
98
## Types
99
100
### TrustedAccessRoleBinding
101
102
```python { .api }
103
class TrustedAccessRoleBinding:
104
"""
105
Trusted access role binding resource.
106
107
Attributes:
108
- provisioning_state (str): Provisioning state
109
- source_resource_id (str): Azure resource ID of the trusted service
110
- roles (List[str]): List of role names to assign
111
"""
112
```
113
114
### TrustedAccessRole
115
116
```python { .api }
117
class TrustedAccessRole:
118
"""
119
Available trusted access role.
120
121
Attributes:
122
- name (str): Role name
123
- rules (List[TrustedAccessRoleRule]): Role rules and permissions
124
"""
125
```
126
127
## Usage Example
128
129
```python
130
from azure.mgmt.containerservice import ContainerServiceClient
131
from azure.mgmt.containerservice.models import TrustedAccessRoleBinding
132
133
client = ContainerServiceClient(credential, subscription_id)
134
135
# List available trusted access roles
136
roles = client.trusted_access_roles.list("East US")
137
for role in roles:
138
print(f"Available role: {role.name}")
139
140
# Create a trusted access role binding
141
role_binding = TrustedAccessRoleBinding(
142
source_resource_id="/subscriptions/sub-id/resourceGroups/rg/providers/Microsoft.KeyVault/vaults/keyvault",
143
roles=["Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/reader"]
144
)
145
146
client.trusted_access_role_bindings.create_or_update_trusted_access_role_binding(
147
"my-rg", "my-cluster", "keyvault-binding", role_binding
148
)
149
```