AKS Authentication
Authentication
All AKS clusters have two categories of users: service accounts managed by AKS, and normal users.
AKS uses client certificates, bearer tokens, an authenticating proxy, or HTTP basic auth to authenticate API requests through authentication plugins.
Information about AKS API’s can be found within the link. Authentication and be found with the link.