Skip to content

Commit 45c99fb

Browse files
committed
updated article and TOC
1 parent 1b176da commit 45c99fb

File tree

2 files changed

+14
-4
lines changed

2 files changed

+14
-4
lines changed

articles/aks/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -332,6 +332,8 @@
332332
href: enable-fips-nodes.md
333333
- name: Application security
334334
items:
335+
- name: Create an OIDC Issuer for your cluster
336+
href: use-oidc-issuer.md
335337
- name: Workload identity (preview)
336338
items:
337339
- name: Overview

articles/aks/use-oidc-issuer.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,17 @@
22
title: Create an OpenID Connect provider for your Azure Kubernetes Service (AKS) cluster
33
description: Learn how to configure the OpenID Connect (OIDC) provider for a cluster in Azure Kubernetes Service (AKS)
44
ms.topic: article
5-
ms.date: 02/16/2023
5+
ms.date: 02/21/2023
66
---
77

88
# Create an OpenID Connect provider on Azure Kubernetes Service (AKS)
99

10-
OpenID Connect (OIDC) extends the OAuth 2.0 authorization protocol for use as an additional authentication protocol. You can use OIDC to enable single sign-on (SSO) between your OAuth-enabled applications by using a security token called an ID token. With your AKS cluster, you can enable OpenID Connect (OIDC) Issuer, which allows Azure Active Directory (Azure AD) or other cloud provider identity and access management platform, to discover the API server's public signing keys.
10+
[OpenID Connect][open-id-connect-overview] (OIDC) extends the OAuth 2.0 authorization protocol for use as an additional authentication protocol issued by Azure Active Directory (Azure AD). You can use OIDC to enable single sign-on (SSO) between your OAuth-enabled applications, on your Azure Kubernetes Service (AKS) cluster, by using a security token called an ID token. With your AKS cluster, you can enable OpenID Connect (OIDC) Issuer, which allows Azure Active Directory (Azure AD) or other cloud provider identity and access management platform, to discover the API server's public signing keys.
1111

1212
AKS rotates the key automatically and periodically. If you don't want to wait, you can rotate the key manually and immediately. The maximum lifetime of the token issued by the OIDC provider is one day.
1313

1414
> [!WARNING]
15-
> Enable or disable OIDC Issuer changes the current service account token issuer to a new value, which can cause down time and restarts the API server. If the application pods using a service token remain in a failed state after you enable or disable the OIDC Issuer, we recommend you manually restart the pods.
15+
> Enable or disable OIDC Issuer changes the current service account token issuer to a new value, which can cause down time and restarts the API server. If your application pods using a service token remain in a failed state after you enable or disable the OIDC Issuer, we recommend you manually restart the pods.
1616
1717
## Prerequisites
1818

@@ -54,11 +54,19 @@ az aks oidc-issuer rotate-signing-keys -n myAKSCluster -g myResourceGroup
5454
> [!IMPORTANT]
5555
> Once you rotate the key, the old key (key1) expires after 24 hours. This means that both the old key (key1) and the new key (key2) are valid within the 24-hour period. If you want to invalidate the old key (key1) immediately, you need to rotate the OIDC key twice. Then key2 and key3 are valid, and key1 is invalid.
5656
57+
## Next steps
58+
59+
* Review [Azure AD workload identity][azure-ad-workload-identity-overview] (preview). This authentication method integrates with the Kubernetes native capabilities to federate with any external identity providers on behalf of the application.
60+
* See [Secure pod network traffic][secure-pod-network-traffic] to understand how to use the Network Policy engine and create Kubernetes network policies to control the flow of traffic between pods in AKS.
61+
5762
<!-- LINKS - external -->
5863

5964
<!-- LINKS - internal -->
65+
[open-id-connect-overview]: ../active-directory/fundamentals/auth-oidc.md
6066
[azure-cli-install]: /cli/azure/install-azure-cli
6167
[az-aks-create]: /cli/azure/aks#az-aks-create
6268
[az-aks-update]: /cli/azure/aks#az-aks-update
6369
[az-aks-show]: /cli/azure/aks#az-aks-show
64-
[az-aks-oidc-issuer]: /cli/azure/aks/oidc-issuer
70+
[az-aks-oidc-issuer]: /cli/azure/aks/oidc-issuer
71+
[azure-ad-workload-identity-overview]: workload-identity-overview.md
72+
[secure-pod-network-traffic]: use-network-policies.md

0 commit comments

Comments
 (0)