diff --git a/articles/aks/concepts-identity.md b/articles/aks/concepts-identity.md index c522bef08..ea6f7ffab 100644 --- a/articles/aks/concepts-identity.md +++ b/articles/aks/concepts-identity.md @@ -157,7 +157,7 @@ As shown in the graphic above, the API server calls the AKS webhook server and p 4. `kubectl` sends the access_token to API Server. 5. The API Server is configured with the Auth WebHook Server to perform validation. 6. The authentication webhook server confirms the JSON Web Token signature is valid by checking the Microsoft Entra public signing key. -7. If the groups are bigger than 200, the server application uses user-provided credentials to query group memberships of the logged-in user from the MS Graph API. If groups do not exceedd 200, the groups claim already exists in the client token, no query will be performed. +7. If the user is a member of more than 200 groups, the server application uses user-provided credentials to query group memberships of the logged-in user from the MS Graph API. For users with group memberships of 200 or fewer the groups claim already exists in the client token. No query will be performed. 8. A response is sent to the API Server with user information such as the user principal name (UPN) claim of the access token, and the group membership of the user based on the object ID. 9. The API performs an authorization decision based on the Kubernetes Role/RoleBinding. 10. Once authorized, the API server returns a response to `kubectl`.