Skip to main contentCúram on Kubernetes

AKS Authentication

Authentication

All AKS clusters have two categories of users: service accounts managed by AKS, and normal users.

AKS uses client certificates, bearer tokens, an authenticating proxy, or HTTP basic auth to authenticate API requests through authentication plugins.

Information about AKS API’s can be found within the link. Authentication and be found with the link.