Skip to content

Commit 061ae07

Browse files
Merge pull request #232277 from rwike77/wifga
removing preview tags for GA
2 parents 8022c84 + c9ee91a commit 061ae07

File tree

2 files changed

+11
-11
lines changed

2 files changed

+11
-11
lines changed

articles/active-directory/workload-identities/workload-identity-federation-considerations.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: workload-identities
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/07/2023
12+
ms.date: 03/27/2023
1313
ms.author: ryanwi
1414
ms.reviewer: shkhalid, udayh, cbrooks
1515
ms.custom: aaddev, references_regions
@@ -24,7 +24,7 @@ For more information on the scenarios enabled by federated identity credentials,
2424

2525
## General federated identity credential considerations
2626

27-
*Applies to: applications and user-assigned managed identities (public preview)*
27+
*Applies to: applications and user-assigned managed identities*
2828

2929
Anyone with permissions to create an app registration and add a secret or certificate can add a federated identity credential to an app. If the **Users can register applications** switch in the [User Settings](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/UserSettings) blade is set to **No**, however, you won't be able to create an app registration or configure the federated identity credential. Find an admin to configure the federated identity credential on your behalf, someone in the Application Administrator or Application Owner roles.
3030

@@ -34,7 +34,7 @@ Federated identity credentials don't consume the Azure AD tenant service princip
3434

3535
## Unsupported regions (user-assigned managed identities)
3636

37-
*Applies to: user-assigned managed identities (public preview)*
37+
*Applies to: user-assigned managed identities*
3838

3939
The creation of federated identity credentials is available on user-assigned managed identities created in most Azure regions during public. However, creation of federated identity credentials is **not supported** on user-assigned managed identities in the following regions:
4040

@@ -50,13 +50,13 @@ Resources in these regions can still use federated identity credentials created
5050

5151
## Supported signing algorithms and issuers
5252

53-
*Applies to: applications and user-assigned managed identities (public preview)*
53+
*Applies to: applications and user-assigned managed identities*
5454

5555
Only issuers that provide tokens signed using the RS256 algorithm are supported for token exchange using workload identity federation. Exchanging tokens signed with other algorithms may work, but haven't been tested.
5656

5757
## Azure Active Directory issuers aren't supported
5858

59-
*Applies to: applications and user-assigned managed identities (public preview)*
59+
*Applies to: applications and user-assigned managed identities*
6060

6161
Creating a federation between two Azure AD identities from the same or different tenants isn't supported. When creating a federated identity credential, configuring the *issuer* (the URL of the external identity provider) with the following values isn't supported:
6262

@@ -69,15 +69,15 @@ While it's possible to create a federated identity credential with an Azure AD i
6969

7070
## Time for federated credential changes to propagate
7171

72-
*Applies to: applications and user-assigned managed identities (public preview)*
72+
*Applies to: applications and user-assigned managed identities*
7373

7474
It takes time for the federated identity credential to be propagated throughout a region after being initially configured. A token request made several minutes after configuring the federated identity credential may fail because the cache is populated in the directory with old data. During this time window, an authorization request might fail with error message: `AADSTS70021: No matching federated identity record found for presented assertion.`
7575

7676
To avoid this issue, wait a short time after adding the federated identity credential before requesting a token to ensure replication completes across all nodes of the authorization service. We also recommend adding retry logic for token requests. Retries should be done for every request even after a token was successfully obtained. Eventually after the data is fully replicated the percentage of failures will drop.
7777

7878
## Concurrent updates aren't supported (user-assigned managed identities)
7979

80-
*Applies to: user-assigned managed identities (public preview)*
80+
*Applies to: user-assigned managed identities*
8181

8282
Creating multiple federated identity credentials under the same user-assigned managed identity concurrently triggers concurrency detection logic, which causes requests to fail with 409-conflict HTTP status code.
8383

@@ -160,7 +160,7 @@ You can also provision multiple new federated identity credentials sequentially
160160

161161
## Azure policy
162162

163-
*Applies to: applications and user-assigned managed identities (public preview)*
163+
*Applies to: applications and user-assigned managed identities*
164164

165165
It's possible to use a deny [Azure Policy](../../governance/policy/overview.md) as in the following ARM template example:
166166

@@ -182,7 +182,7 @@ It's possible to use a deny [Azure Policy](../../governance/policy/overview.md)
182182

183183
*Applies to: user-assigned managed identities*
184184

185-
The following table describes limits on requests to the user-assigned managed identities (public preview) REST APIS. If you exceed a throttling limit, you receive an HTTP 429 error.
185+
The following table describes limits on requests to the user-assigned managed identities REST APIS. If you exceed a throttling limit, you receive an HTTP 429 error.
186186

187187
| Operation | Requests-per-second per Azure AD tenant | Requests-per-second per subscription | Requests-per-second per resource |
188188
|-------------------|----------------|----------------|----------------|

articles/active-directory/workload-identities/workload-identity-federation-create-trust-user-assigned-managed-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,15 +9,15 @@ ms.service: active-directory
99
ms.subservice: workload-identities
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 03/06/2023
12+
ms.date: 03/27/2023
1313
ms.author: ryanwi
1414
ms.custom: aaddev, devx-track-azurecli, devx-track-azurepowershell
1515
ms.reviewer: shkhalide, udayh, vakarand
1616
zone_pivot_groups: identity-wif-mi-methods
1717
#Customer intent: As an application developer, I want to configure a federated credential on a user-assigned managed identity so I can create a trust relationship with an external identity provider and use workload identity federation to access Azure AD protected resources without managing secrets.
1818
---
1919

20-
# Configure a user-assigned managed identity to trust an external identity provider (preview)
20+
# Configure a user-assigned managed identity to trust an external identity provider
2121

2222
This article describes how to manage a federated identity credential on a user-assigned managed identity in Azure Active Directory (Azure AD). The federated identity credential creates a trust relationship between a user-assigned managed identity and an external identity provider (IdP). Configuring a federated identity credential on a system-assigned managed identity isn't supported.
2323

0 commit comments

Comments
 (0)