You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/quickstart-azure-kubernetes-service.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -273,7 +273,7 @@ Add following key-values to the App Configuration store and leave **Label** and
273
273
> - The ConfigMap will be reset based on the present data in your App Configuration store if it's deleted or modified by any other means.
274
274
> - The ConfigMap will be deleted if the App Configuration Kubernetes Provider is uninstalled.
275
275
276
-
1. In this example, you use workload identity to authenticate with your App Configuration store. Follow these [instructions](./reference-kubernetes-provider.md#use-workload-identity) to set it up, and replace the serviceAccountName field with the name of the service account you created in the *appConfigurationProvider.yaml* file. For more information on other authentication methods, see the [Authentication](./reference-kubernetes-provider.md#authentication) section.
276
+
1. In this example, you use workload identity to authenticate with your App Configuration store. Follow these [instructions](./reference-kubernetes-provider.md#use-workload-identity) to set it up, and replace the `serviceAccountName` field with the name of the service account you created in the *appConfigurationProvider.yaml* file. For more information on other authentication methods, see the [Authentication](./reference-kubernetes-provider.md#authentication) section.
277
277
278
278
1. Update the *deployment.yaml* file in the *Deployment* directory to use the ConfigMap `configmap-created-by-appconfig-provider` as a mounted data volume. It is important to ensure that the `volumeMounts.mountPath` matches the `WORKDIR` specified in your *Dockerfile* and the *config* directory created before.
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/reference-kubernetes-provider.md
+10-19Lines changed: 10 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,20 +52,11 @@ The `spec.auth` property isn't required if the connection string of your App Con
52
52
|workloadIdentity|The settings for using workload identity.|false|object|
53
53
|managedIdentityClientId|The client ID of user-assigned managed identity of virtual machine scale set.|false|string|
54
54
55
-
The `spec.auth.workloadIdentity` property has the following child properties. One of them must be specified.
55
+
The `spec.auth.workloadIdentity` property has the following child property.
56
56
57
57
|Name|Description|Required|Type|
58
58
|---|---|---|---|
59
-
|managedIdentityClientId|The client ID of the user-assigned managed identity associated with the workload identity.|alternative|string|
60
-
|managedIdentityClientIdReference|The client ID of the user-assigned managed identity can be obtained from a ConfigMap. The ConfigMap must be in the same namespace as the Kubernetes provider.|alternative|object|
61
-
|serviceAccountName|The name of the service account associated with the workload identity.|alternative|string|
62
-
63
-
The `spec.auth.workloadIdentity.managedIdentityClientIdReference` property has the following child properties.
64
-
65
-
|Name|Description|Required|Type|
66
-
|---|---|---|---|
67
-
|configMap|The name of the ConfigMap where the client ID of a user-assigned managed identity can be found.|true|string|
68
-
|key|The key name that holds the value for the client ID of a user-assigned managed identity.|true|string|
59
+
|serviceAccountName|The name of the service account associated with the workload identity.|true|string|
69
60
70
61
The `spec.configuration` has the following child properties.
71
62
@@ -117,7 +108,7 @@ If the `spec.secret.auth` property isn't set, the system-assigned managed identi
117
108
|Name|Description|Required|Type|
118
109
|---|---|---|---|
119
110
|servicePrincipalReference|The name of the Kubernetes Secret that contains the credentials of a service principal used for authentication with Key Vaults that don't have individual authentication methods specified.|false|string|
120
-
|workloadIdentity|The settings of the workload identity used for authentication with Key Vaults that don't have individual authentication methods specified. It has the same child properties as `spec.auth.workloadIdentity`.|false|object|
111
+
|workloadIdentity|The settings of the workload identity used for authentication with Key Vaults that don't have individual authentication methods specified. It has the same child property as `spec.auth.workloadIdentity`.|false|object|
121
112
|managedIdentityClientId|The client ID of a user-assigned managed identity of virtual machine scale set used for authentication with Key Vaults that don't have individual authentication methods specified.|false|string|
122
113
|keyVaults|The authentication methods for individual Key Vaults.|false|object array|
123
114
@@ -127,7 +118,7 @@ The authentication method of each *Key Vault* can be specified with the followin
127
118
|---|---|---|---|
128
119
|uri|The URI of a Key Vault.|true|string|
129
120
|servicePrincipalReference|The name of the Kubernetes Secret that contains the credentials of a service principal used for authentication with a Key Vault.|false|string|
130
-
|workloadIdentity|The settings of the workload identity used for authentication with a Key Vault. It has the same child properties as `spec.auth.workloadIdentity`.|false|object|
121
+
|workloadIdentity|The settings of the workload identity used for authentication with a Key Vault. It has the same child property as `spec.auth.workloadIdentity`.|false|object|
131
122
|managedIdentityClientId|The client ID of a user-assigned managed identity of virtual machine scale set used for authentication with a Key Vault.|false|string|
132
123
133
124
The `spec.secret.refresh` property has the following child properties.
@@ -261,11 +252,11 @@ The software may collect information about you and your use of the software and
261
252
262
253
1. [Get the OIDC issuer URL](/azure/aks/workload-identity-deploy-cluster#retrieve-the-oidc-issuer-url) of the AKS cluster.
263
254
264
-
1. [Create a user-assigned managed identity](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities#create-a-user-assigned-managed-identity) and note down its name and resource group.
265
-
255
+
1. [Create a user-assigned managed identity](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities#create-a-user-assigned-managed-identity) and note down its client ID, tenant ID, name, and resource group.
256
+
266
257
1. [Grant the user-assigned managed identity **App Configuration Data Reader** role](/azure/azure-app-configuration/concept-enable-rbac#assign-azure-roles-for-access-rights) in Azure App Configuration.
267
258
268
-
1. Create a service account by applying the following sample yaml. Replace `<your-managed-identity-client-id>` with the client ID and `<your-tenant-id>` with the tenant ID of the user-assigned managed identity just been created. Replace `<your-service-account-name>` with your favorite name.
259
+
1. Create a service account by applying the following sample yaml. Replace `<your-managed-identity-client-id>` with the client ID and `<your-tenant-id>` with the tenant ID of the user-assigned managed identity that has just been created. Replace `<your-service-account-name>` with your preferred name.
269
260
270
261
``` yaml
271
262
apiVersion: v1
@@ -277,15 +268,15 @@ The software may collect information about you and your use of the software and
1. Create federated identity credential for the user-assigned managed identity using the Azure CLI. Replace `<user-assigned-identity-name>` with name and `<resource-group>` with resource group of user-assigned managed identity just been created. Replace `<aks-oidc-issuer>` with the OIDC issuer URL of the AKS cluster. Replace `<your-service-account-name>` with the name of the service account just been created.
271
+
1. Create a federated identity credential for the user-assigned managed identity using the Azure CLI. Replace `<user-assigned-identity-name>` with the name and `<resource-group>` with the resource group of the newly created user-assigned managed identity. Replace `<aks-oidc-issuer>` with the OIDC issuer URL of the AKS cluster. Replace `<your-service-account-name>` with the name of the newly created service account.
The subject of the federated identity credential should be in the format `system:serviceaccount:<service-account-namespace>:<service-account-name>`.
277
+
Note that the subject of the federated identity credential should follow this format:`system:serviceaccount:<service-account-namespace>:<service-account-name>`.
287
278
288
-
1. Apply the following sample `AzureAppConfigurationProvider` resource to the Kubernetes cluster. Be sure it's in the same namespace as the service account. Replace `<your-app-configuration-store-endpoint>` with the endpoint of the Azure App Configuration store. Replace `<your-service-account-name>` with the name of the service account just been created.
279
+
1. Apply the following sample `AzureAppConfigurationProvider` resource to the Kubernetes cluster. Be sure it's in the same namespace as the service account. Replace `<your-service-account-name>` with the name of the service account you just created.
0 commit comments