or run

npx @tessl/cli init
Log in

Version

Tile

Overview

Evals

Files

Files

docs

agent-pools.mdindex.mdmachines.mdmaintenance.mdmanaged-clusters.mdmodels.mdprivate-endpoints.mdsnapshots.mdtrusted-access.md

trusted-access.mddocs/

0

# Trusted Access

1

2

Trusted access role bindings and role management for secure integration with other Azure services and custom applications. This feature allows AKS clusters to grant specific Azure services secure access to cluster resources without requiring custom credential management.

3

4

## Capabilities

5

6

### Trusted Access Role Binding Management

7

8

Create and manage role bindings that grant trusted Azure services access to AKS cluster resources.

9

10

```python { .api }

11

def get(

12

resource_group_name: str,

13

resource_name: str,

14

trusted_access_role_binding_name: str,

15

**kwargs

16

) -> TrustedAccessRoleBinding:

17

"""

18

Get a trusted access role binding.

19

20

Parameters:

21

- resource_group_name (str): The name of the resource group

22

- resource_name (str): The name of the managed cluster

23

- trusted_access_role_binding_name (str): The name of the trusted access role binding

24

25

Returns:

26

TrustedAccessRoleBinding: The trusted access role binding

27

"""

28

29

def begin_create_or_update(

30

resource_group_name: str,

31

resource_name: str,

32

trusted_access_role_binding_name: str,

33

parameters: TrustedAccessRoleBinding,

34

**kwargs

35

) -> TrustedAccessRoleBinding:

36

"""

37

Create or update a trusted access role binding.

38

39

Parameters:

40

- resource_group_name (str): The name of the resource group

41

- resource_name (str): The name of the managed cluster

42

- trusted_access_role_binding_name (str): The name of the trusted access role binding

43

- parameters (TrustedAccessRoleBinding): The role binding specification

44

45

Returns:

46

TrustedAccessRoleBinding: The created or updated role binding

47

"""

48

49

def begin_delete(

50

resource_group_name: str,

51

resource_name: str,

52

trusted_access_role_binding_name: str,

53

**kwargs

54

) -> None:

55

"""

56

Delete a trusted access role binding.

57

58

Parameters:

59

- resource_group_name (str): The name of the resource group

60

- resource_name (str): The name of the managed cluster

61

- trusted_access_role_binding_name (str): The name of the trusted access role binding

62

"""

63

64

def list_trusted_access_role_bindings(

65

resource_group_name: str,

66

resource_name: str,

67

**kwargs

68

) -> ItemPaged[TrustedAccessRoleBinding]:

69

"""

70

List trusted access role bindings for a cluster.

71

72

Parameters:

73

- resource_group_name (str): The name of the resource group

74

- resource_name (str): The name of the managed cluster

75

76

Returns:

77

ItemPaged[TrustedAccessRoleBinding]: Paginated list of role bindings

78

"""

79

```

80

81

### Trusted Access Role Discovery

82

83

Discover available trusted access roles that can be assigned to Azure services.

84

85

```python { .api }

86

def list_trusted_access_roles(location: str, **kwargs) -> ItemPaged[TrustedAccessRole]:

87

"""

88

List available trusted access roles for a location.

89

90

Parameters:

91

- location (str): The Azure location

92

93

Returns:

94

ItemPaged[TrustedAccessRole]: Paginated list of available roles

95

"""

96

```

97

98

## Types

99

100

### TrustedAccessRoleBinding

101

102

```python { .api }

103

class TrustedAccessRoleBinding:

104

"""

105

Trusted access role binding resource.

106

107

Attributes:

108

- provisioning_state (str): Provisioning state

109

- source_resource_id (str): Azure resource ID of the trusted service

110

- roles (List[str]): List of role names to assign

111

"""

112

```

113

114

### TrustedAccessRole

115

116

```python { .api }

117

class TrustedAccessRole:

118

"""

119

Available trusted access role.

120

121

Attributes:

122

- name (str): Role name

123

- rules (List[TrustedAccessRoleRule]): Role rules and permissions

124

"""

125

```

126

127

## Usage Example

128

129

```python

130

from azure.mgmt.containerservice import ContainerServiceClient

131

from azure.mgmt.containerservice.models import TrustedAccessRoleBinding

132

133

client = ContainerServiceClient(credential, subscription_id)

134

135

# List available trusted access roles

136

roles = client.trusted_access_roles.list("East US")

137

for role in roles:

138

print(f"Available role: {role.name}")

139

140

# Create a trusted access role binding

141

role_binding = TrustedAccessRoleBinding(

142

source_resource_id="/subscriptions/sub-id/resourceGroups/rg/providers/Microsoft.KeyVault/vaults/keyvault",

143

roles=["Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/reader"]

144

)

145

146

client.trusted_access_role_bindings.create_or_update_trusted_access_role_binding(

147

"my-rg", "my-cluster", "keyvault-binding", role_binding

148

)

149

```