Skip to content

Commit 6d11c87

Browse files
Merge branch 'user/junbchen/saWorkloadIdentity' of https://github.com/RichardChen820/azure-docs-pr into user/junbchen/saWorkloadIdentity
2 parents 000596a + c2b7b3b commit 6d11c87

File tree

2 files changed

+25
-0
lines changed

2 files changed

+25
-0
lines changed

articles/azure-app-configuration/quickstart-azure-kubernetes-service.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -245,6 +245,30 @@ Add following key-values to the App Configuration store and leave **Label** and
245245
> [!TIP]
246246
> The App Configuration Kubernetes Provider is also available as an AKS extension. This integration allows for seamless installation and management via the Azure CLI, ARM templates, or Bicep templates. Utilizing the AKS extension facilitates automatic minor/patch version updates, ensuring your system is always up-to-date. For detailed installation instructions, please refer to the [Azure App Configuration extension for Azure Kubernetes Service](/azure/aks/azure-app-configuration).
247247
248+
1. Follow the step 1-4 in [using workload identity](./reference-kubernetes-provider.md#use-workload-identity) and note down the client ID, tenant ID, resource group and name of the managed identity, the OIDC issuer URL of the AKS cluster, you will use them in the following steps.
249+
250+
1. Add a *serviceaccount.yaml* file to the *Deployment* directory with the following content to create a service account for the application.
251+
252+
```yaml
253+
apiVersion: v1
254+
kind: ServiceAccount
255+
metadata:
256+
name: aspnetapp-demo-service-account
257+
annotations:
258+
azure.workload.identity/client-id: <your-managed-identity-client-id>
259+
azure.workload.identity/tenant-id: <your-tenant-id>
260+
```
261+
262+
Replace the value of the `azure.workload.identity/client-id` and `azure.workload.identity/tenant-id` fields with the client ID and tenant ID of the managed identity you created in the previous step.
263+
264+
1. Create federated credentials for the service account by running the following command:
265+
266+
```azurecli
267+
az identity federated-credential create --name "federated-credential-demo" --identity-name <identity-name> --resource-group <resource-group> --issuer <OIDC-issuer> --subject system:serviceaccount:default:aspnetapp-demo-service-account --audience api://AzureADTokenExchange
268+
```
269+
270+
Replace the value of the `identity-name`, `resource-group` fields with the name, resource group of your managed identity created in the previous step. Replace the value of the `OIDC-issuer` field with the OIDC issuer URL of your AKS cluster.
271+
248272
1. Add an *appConfigurationProvider.yaml* file to the *Deployment* directory with the following content to create an `AzureAppConfigurationProvider` resource. `AzureAppConfigurationProvider` is a custom resource that defines what data to download from an Azure App Configuration store and creates a ConfigMap.
249273
250274
```yaml

articles/azure-app-configuration/reference-kubernetes-provider.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,7 @@ The `spec.featureFlag.refresh` property has the following child properties.
163163

164164
Use the following `helm install` command to install the Azure App Configuration Kubernetes Provider. See [helm-values.yaml](https://github.com/Azure/AppConfiguration-KubernetesProvider/blob/main/deploy/parameter/helm-values.yaml) for the complete list of parameters and their default values. You can override the default values by passing the `--set` flag to the command.
165165

166+
166167
```bash
167168
helm install azureappconfiguration.kubernetesprovider \
168169
oci://mcr.microsoft.com/azure-app-configuration/helmchart/kubernetes-provider \

0 commit comments

Comments
 (0)