You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/csi-secrets-store-identity-access.md
+11-2Lines changed: 11 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -133,6 +133,9 @@ In this security model, the AKS cluster acts as token issuer. Microsoft Entra ID
133
133
> [!NOTE]
134
134
> If you use `objectAlias` instead of `objectName`, update the YAML script to account for it.
135
135
136
+
> [!NOTE]
137
+
> In order for the `SecretProviderClass` to function properly, make sure to populate your Azure Key Vault with secrets, keys, or certificates before referencing them in the `objects` section.
138
+
136
139
8. Deploy a sample pod using the `kubectl apply` command and the following YAML script.
137
140
138
141
```bash
@@ -176,10 +179,11 @@ In this security model, you can grant access to your cluster's resources to team
176
179
177
180
### Configure managed identity
178
181
179
-
1. Access your key vault using the [`az aks show`][az-aks-show] command and the user-assigned managed identity created by the add-on.
182
+
1. Access your key vault using the [`az aks show`][az-aks-show] command and the user-assigned managed identity created by the add-on. You should also retrieve the identity's `clientId`, which you'll use in later steps when creating a `SecretProviderClass`.
180
183
181
184
```azurecli-interactive
182
185
az aks show -g <resource-group> -n <cluster-name> --query addonProfiles.azureKeyvaultSecretsProvider.identity.objectId -o tsv
186
+
az aks show -g <resource-group> -n <cluster-name> --query addonProfiles.azureKeyvaultSecretsProvider.identity.clientId -o tsv
183
187
```
184
188
185
189
Alternatively, you can create a new managed identity and assign it to your virtual machine (VM) scale set or to each VM instance in your availability set using the following commands.
@@ -188,9 +192,11 @@ In this security model, you can grant access to your cluster's resources to team
188
192
az identity create -g <resource-group> -n <identity-name>
189
193
az vmss identity assign -g <resource-group> -n <agent-pool-vmss> --identities <identity-resource-id>
190
194
az vm identity assign -g <resource-group> -n <agent-pool-vm> --identities <identity-resource-id>
195
+
196
+
az identity show -g <resource-group> --name <identity-name> --query 'clientId' -o tsv
191
197
```
192
198
193
-
2. Create a role assignment that grants the identity permission access to the key vault secrets, access keys, and certificates using the [`az role assignment create`][az-role-assignment-create] command.
199
+
2. Create a role assignment that grants the identity permission access to the key vault secrets, access keys, and certificates using the [`az role assignment create`][az-role-assignment-create] command.
@@ -230,6 +236,9 @@ In this security model, you can grant access to your cluster's resources to team
230
236
231
237
> [!NOTE]
232
238
> If you use `objectAlias` instead of `objectName`, make sure to update the YAML script.
239
+
240
+
> [!NOTE]
241
+
> In order for the `SecretProviderClass` to function properly, make sure to populate your Azure Key Vault with secrets, keys, or certificates before referencing them in the `objects` section.
233
242
234
243
4. Apply the `SecretProviderClass` to your cluster using the `kubectl apply` command.
0 commit comments