You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/workload-identities/workload-identity-federation-considerations.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: workload-identities
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 03/07/2023
12
+
ms.date: 03/27/2023
13
13
ms.author: ryanwi
14
14
ms.reviewer: shkhalid, udayh, cbrooks
15
15
ms.custom: aaddev, references_regions
@@ -24,7 +24,7 @@ For more information on the scenarios enabled by federated identity credentials,
24
24
25
25
## General federated identity credential considerations
26
26
27
-
*Applies to: applications and user-assigned managed identities (public preview)*
27
+
*Applies to: applications and user-assigned managed identities*
28
28
29
29
Anyone with permissions to create an app registration and add a secret or certificate can add a federated identity credential to an app. If the **Users can register applications** switch in the [User Settings](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/UserSettings) blade is set to **No**, however, you won't be able to create an app registration or configure the federated identity credential. Find an admin to configure the federated identity credential on your behalf, someone in the Application Administrator or Application Owner roles.
30
30
@@ -34,7 +34,7 @@ Federated identity credentials don't consume the Azure AD tenant service princip
34
34
35
35
## Unsupported regions (user-assigned managed identities)
36
36
37
-
*Applies to: user-assigned managed identities (public preview)*
37
+
*Applies to: user-assigned managed identities*
38
38
39
39
The creation of federated identity credentials is available on user-assigned managed identities created in most Azure regions during public. However, creation of federated identity credentials is **not supported** on user-assigned managed identities in the following regions:
40
40
@@ -50,13 +50,13 @@ Resources in these regions can still use federated identity credentials created
50
50
51
51
## Supported signing algorithms and issuers
52
52
53
-
*Applies to: applications and user-assigned managed identities (public preview)*
53
+
*Applies to: applications and user-assigned managed identities*
54
54
55
55
Only issuers that provide tokens signed using the RS256 algorithm are supported for token exchange using workload identity federation. Exchanging tokens signed with other algorithms may work, but haven't been tested.
56
56
57
57
## Azure Active Directory issuers aren't supported
58
58
59
-
*Applies to: applications and user-assigned managed identities (public preview)*
59
+
*Applies to: applications and user-assigned managed identities*
60
60
61
61
Creating a federation between two Azure AD identities from the same or different tenants isn't supported. When creating a federated identity credential, configuring the *issuer* (the URL of the external identity provider) with the following values isn't supported:
62
62
@@ -69,15 +69,15 @@ While it's possible to create a federated identity credential with an Azure AD i
69
69
70
70
## Time for federated credential changes to propagate
71
71
72
-
*Applies to: applications and user-assigned managed identities (public preview)*
72
+
*Applies to: applications and user-assigned managed identities*
73
73
74
74
It takes time for the federated identity credential to be propagated throughout a region after being initially configured. A token request made several minutes after configuring the federated identity credential may fail because the cache is populated in the directory with old data. During this time window, an authorization request might fail with error message: `AADSTS70021: No matching federated identity record found for presented assertion.`
75
75
76
76
To avoid this issue, wait a short time after adding the federated identity credential before requesting a token to ensure replication completes across all nodes of the authorization service. We also recommend adding retry logic for token requests. Retries should be done for every request even after a token was successfully obtained. Eventually after the data is fully replicated the percentage of failures will drop.
*Applies to: user-assigned managed identities (public preview)*
80
+
*Applies to: user-assigned managed identities*
81
81
82
82
Creating multiple federated identity credentials under the same user-assigned managed identity concurrently triggers concurrency detection logic, which causes requests to fail with 409-conflict HTTP status code.
83
83
@@ -160,7 +160,7 @@ You can also provision multiple new federated identity credentials sequentially
160
160
161
161
## Azure policy
162
162
163
-
*Applies to: applications and user-assigned managed identities (public preview)*
163
+
*Applies to: applications and user-assigned managed identities*
164
164
165
165
It's possible to use a deny [Azure Policy](../../governance/policy/overview.md) as in the following ARM template example:
166
166
@@ -182,7 +182,7 @@ It's possible to use a deny [Azure Policy](../../governance/policy/overview.md)
182
182
183
183
*Applies to: user-assigned managed identities*
184
184
185
-
The following table describes limits on requests to the user-assigned managed identities (public preview) REST APIS. If you exceed a throttling limit, you receive an HTTP 429 error.
185
+
The following table describes limits on requests to the user-assigned managed identities REST APIS. If you exceed a throttling limit, you receive an HTTP 429 error.
186
186
187
187
| Operation | Requests-per-second per Azure AD tenant | Requests-per-second per subscription | Requests-per-second per resource |
Copy file name to clipboardExpand all lines: articles/active-directory/workload-identities/workload-identity-federation-create-trust-user-assigned-managed-identity.md
#Customer intent: As an application developer, I want to configure a federated credential on a user-assigned managed identity so I can create a trust relationship with an external identity provider and use workload identity federation to access Azure AD protected resources without managing secrets.
18
18
---
19
19
20
-
# Configure a user-assigned managed identity to trust an external identity provider (preview)
20
+
# Configure a user-assigned managed identity to trust an external identity provider
21
21
22
22
This article describes how to manage a federated identity credential on a user-assigned managed identity in Azure Active Directory (Azure AD). The federated identity credential creates a trust relationship between a user-assigned managed identity and an external identity provider (IdP). Configuring a federated identity credential on a system-assigned managed identity isn't supported.
0 commit comments