(::Array<::Google::Cloud::GkeMultiCloud::V1::AzureClusterGroup>) — Optional. Groups of users that can perform operations as a cluster admin. A
managed ClusterRoleBinding will be created to grant the cluster-admin
ClusterRole to the groups. Up to ten admin groups can be provided.
For more info on RBAC, see
https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
value (::Array<::Google::Cloud::GkeMultiCloud::V1::AzureClusterGroup>) — Optional. Groups of users that can perform operations as a cluster admin. A
managed ClusterRoleBinding will be created to grant the cluster-admin
ClusterRole to the groups. Up to ten admin groups can be provided.
For more info on RBAC, see
https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
Returns
(::Array<::Google::Cloud::GkeMultiCloud::V1::AzureClusterGroup>) — Optional. Groups of users that can perform operations as a cluster admin. A
managed ClusterRoleBinding will be created to grant the cluster-admin
ClusterRole to the groups. Up to ten admin groups can be provided.
For more info on RBAC, see
https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
(::Array<::Google::Cloud::GkeMultiCloud::V1::AzureClusterUser>) — Optional. Users that can perform operations as a cluster admin. A managed
ClusterRoleBinding will be created to grant the cluster-admin ClusterRole
to the users. Up to ten admin users can be provided.
For more info on RBAC, see
https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
value (::Array<::Google::Cloud::GkeMultiCloud::V1::AzureClusterUser>) — Optional. Users that can perform operations as a cluster admin. A managed
ClusterRoleBinding will be created to grant the cluster-admin ClusterRole
to the users. Up to ten admin users can be provided.
For more info on RBAC, see
https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
Returns
(::Array<::Google::Cloud::GkeMultiCloud::V1::AzureClusterUser>) — Optional. Users that can perform operations as a cluster admin. A managed
ClusterRoleBinding will be created to grant the cluster-admin ClusterRole
to the users. Up to ten admin users can be provided.
For more info on RBAC, see
https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[],[],null,["# Anthos Multi-Cloud V1 API - Class Google::Cloud::GkeMultiCloud::V1::AzureAuthorization (v0.15.0)\n\nVersion latestkeyboard_arrow_down\n\n- [0.15.0 (latest)](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/latest/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.14.1](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.14.1/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.13.0](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.13.0/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.12.0](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.12.0/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.11.0](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.11.0/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.10.1](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.10.1/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.9.0](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.9.0/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.8.2](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.8.2/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.7.0](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.7.0/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.6.0](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.6.0/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.5.0](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.5.0/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.4.0](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.4.0/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.3.0](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.3.0/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.2.0](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.2.0/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization)\n- [0.1.0](/ruby/docs/reference/google-cloud-gke_multi_cloud-v1/0.1.0/Google-Cloud-GkeMultiCloud-V1-AzureAuthorization) \nReference documentation and code samples for the Anthos Multi-Cloud V1 API class Google::Cloud::GkeMultiCloud::V1::AzureAuthorization.\n\nConfiguration related to the cluster RBAC settings. \n\nInherits\n--------\n\n- Object \n\nExtended By\n-----------\n\n- Google::Protobuf::MessageExts::ClassMethods \n\nIncludes\n--------\n\n- Google::Protobuf::MessageExts\n\nMethods\n-------\n\n### #admin_groups\n\n def admin_groups() -\u003e ::Array\u003c::Google::Cloud::GkeMultiCloud::V1::AzureClusterGroup\u003e\n\n**Returns**\n\n- (::Array\\\u003c[::Google::Cloud::GkeMultiCloud::V1::AzureClusterGroup](./Google-Cloud-GkeMultiCloud-V1-AzureClusterGroup)\\\u003e) --- Optional. Groups of users that can perform operations as a cluster admin. A managed ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole to the groups. Up to ten admin groups can be provided.\n\n\n For more info on RBAC, see\n https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles\n\n### #admin_groups=\n\n def admin_groups=(value) -\u003e ::Array\u003c::Google::Cloud::GkeMultiCloud::V1::AzureClusterGroup\u003e\n\n**Parameter**\n\n- **value** (::Array\\\u003c[::Google::Cloud::GkeMultiCloud::V1::AzureClusterGroup](./Google-Cloud-GkeMultiCloud-V1-AzureClusterGroup)\\\u003e) --- Optional. Groups of users that can perform operations as a cluster admin. A managed ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole to the groups. Up to ten admin groups can be provided.\n\n\n For more info on RBAC, see\nhttps://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles \n**Returns**\n\n- (::Array\\\u003c[::Google::Cloud::GkeMultiCloud::V1::AzureClusterGroup](./Google-Cloud-GkeMultiCloud-V1-AzureClusterGroup)\\\u003e) --- Optional. Groups of users that can perform operations as a cluster admin. A managed ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole to the groups. Up to ten admin groups can be provided.\n\n\n For more info on RBAC, see\n https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles\n\n### #admin_users\n\n def admin_users() -\u003e ::Array\u003c::Google::Cloud::GkeMultiCloud::V1::AzureClusterUser\u003e\n\n**Returns**\n\n- (::Array\\\u003c[::Google::Cloud::GkeMultiCloud::V1::AzureClusterUser](./Google-Cloud-GkeMultiCloud-V1-AzureClusterUser)\\\u003e) --- Optional. Users that can perform operations as a cluster admin. A managed ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole to the users. Up to ten admin users can be provided.\n\n\n For more info on RBAC, see\n https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles\n\n### #admin_users=\n\n def admin_users=(value) -\u003e ::Array\u003c::Google::Cloud::GkeMultiCloud::V1::AzureClusterUser\u003e\n\n**Parameter**\n\n- **value** (::Array\\\u003c[::Google::Cloud::GkeMultiCloud::V1::AzureClusterUser](./Google-Cloud-GkeMultiCloud-V1-AzureClusterUser)\\\u003e) --- Optional. Users that can perform operations as a cluster admin. A managed ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole to the users. Up to ten admin users can be provided.\n\n\n For more info on RBAC, see\nhttps://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles \n**Returns**\n\n- (::Array\\\u003c[::Google::Cloud::GkeMultiCloud::V1::AzureClusterUser](./Google-Cloud-GkeMultiCloud-V1-AzureClusterUser)\\\u003e) --- Optional. Users that can perform operations as a cluster admin. A managed ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole to the users. Up to ten admin users can be provided.\n\n\n For more info on RBAC, see\n https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles"]]