Skip to content

Commit 331da1d

Browse files
Merge pull request #227660 from rwike77/wifvideo
added video
2 parents 9357999 + 333ff89 commit 331da1d

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/active-directory/develop/workload-identity-federation.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 10/31/2022
12+
ms.date: 02/16/2023
1313
ms.author: ryanwi
14-
ms.reviewer: shkhalid, udayh, vakarand
14+
ms.reviewer: shkhalid, udayh
1515
ms.custom: aaddev
1616
#Customer intent: As a developer, I want to learn about workload identity federation so that I can securely access Azure AD protected resources from external apps and services without needing to manage secrets.
1717
---
@@ -23,6 +23,9 @@ You can use workload identity federation in scenarios such as GitHub Actions, wo
2323

2424
## Why use workload identity federation?
2525

26+
Watch this video to learn why you would use workload identity federation.
27+
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWXamJ]
28+
2629
Typically, a software workload (such as an application, service, script, or container-based application) needs an identity in order to authenticate and access resources or communicate with other services. When these workloads run on Azure, you can use [managed identities](../managed-identities-azure-resources/overview.md) and the Azure platform manages the credentials for you. For a software workload running outside of Azure, you need to use application credentials (a secret or certificate) to access Azure AD protected resources (such as Azure, Microsoft Graph, Microsoft 365, or third-party resources). These credentials pose a security risk and have to be stored securely and rotated regularly. You also run the risk of service downtime if the credentials expire.
2730

2831
You use workload identity federation to configure an Azure AD app registration or [user-assigned managed identity](../managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md) to trust tokens from an external identity provider (IdP), such as GitHub. Once that trust relationship is created, your software workload can exchange trusted tokens from the external IdP for access tokens from Microsoft identity platform. Your software workload then uses that access token to access the Azure AD protected resources to which the workload has been granted access. This eliminates the maintenance burden of manually managing credentials and eliminates the risk of leaking secrets or having certificates expire.

0 commit comments

Comments
 (0)