@Ashu Ghildiyal can you try cleaning up the KubeConfig via Kubectl config commands?
OIDC token generated for AzureAD app not able to access AKS resources that has AzureAD enabled.
Ashu Ghildiyal
21
Reputation points
I have an AKS cluster that has AzureAD, RBAC enabled I also have registered an app on AzureAD. Now I am trying to get a token with the typical go-oidc package flow with the necessary AzureAD configs but the token i get is not able to access AKS resources I get a 401 unauthorized error
Note: I have the required clusterrole and clusterrolebindings that allow the AzureAD group to access all the resources.
more info:
I have tried the same token with a minikube cluster locally which has oidc configured which works there
1 answer
Sort by: Most helpful
-
Vidya Narasimhan 2,126 Reputation points Microsoft Employee
2022-04-28T14:08:24.773+00:00