Azure billing and Active Directory tenant considerations for AKS (optional)

Enterprise enrollment is not a requirement for the AKS landing zone accelerator. For most customer implementations, standard best practices around enterprise enrollment and Active Directory tenants are unchanged when deploying Azure landing zones for AKS. There are seldom specific considerations or recommendations that would impact enterprise enrollment or Active Directory tenant decisions. See the following considerations to determine whether AKS requirements would impact existing tenant decisions.

However, it could be important to understand any decisions previously made by the cloud platform team to be aware of existing enterprise enrollment or Active Directory tenant decisions.

You might also want to review the identity and access management considerations to understand how the Active Directory tenant is applied in the design of authentication and authorization solutions. You might also want to evaluate the resource organization considerations to understand how the enrollment might be organized into management groups, subscriptions, and resource groups.

Design considerations

Most customers will identify their primary Microsoft Entra tenant as their Kubernetes role-based access control (RBAC) Microsoft Entra tenant. But, Kubernetes allows for different elevations of RBAC management. There are situations where you might want to establish a different Kubernetes RBAC Microsoft Entra tenant from the tenant, which governs identity for the landing zone. This can lead to some specific considerations when establishing Azure landing zones for AKS. The following are indicators that might lead you to consider this alternative approach to tenant assignment:

  • Will the landing zone or Kubernetes hosts be used as part of clean-room development?
  • Are there heightened compliance requirements, which specify separation of duties between the people operating the host and the accounts that operate the landing zone environment?
  • In a centrally managed environment with multiple hosts in a single landing zone, is there a need for extended blast radius control for compromised identities?

Managing multiple Microsoft Entra tenants comes at a management cost that must be weighed against the benefits gained from such a topology. There are seldom cases with multiple tenants would be part of any Microsoft recommendation. But the above questions could indicate a need to consider this option.