Skip to content

Commit 7158dc7

Browse files
authored
Update csi-secrets-store-identity-access.md
1 parent 93838cd commit 7158dc7

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/aks/csi-secrets-store-identity-access.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
2626

2727
1. Follow the instructions in [Use Azure Active Directory pod-managed identities in Azure Kubernetes Service (Preview)][aad-pod-identity-create] to create a cluster identity, assign it permissions, and create a pod identity. Take note of the newly created identity's `clientId` and `name`.
2828

29-
1. Assign permissions to the new identity to enable it to read your key vault instance and view its contents by running the following commands:
29+
1. Assign permissions to the new identity to enable it to read your key vault and view its contents by running the following commands:
3030

3131
```azurecli-interactive
3232
# set policy to access keys in your key vault
@@ -37,7 +37,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
3737
az keyvault set-policy -n <keyvault-name> --certificate-permissions get --spn <pod-identity-client-id>
3838
```
3939
40-
1. Create a `SecretProviderClass` by using the following YAML, using your own values for `aadpodidbinding`, `tenantId`, and the objects to retrieve from your key vault instance:
40+
1. Create a `SecretProviderClass` by using the following YAML, using your own values for `aadpodidbinding`, `tenantId`, and the objects to retrieve from your key vault:
4141
4242
```yml
4343
# This is a SecretProviderClass example using aad-pod-identity to access the key vault
@@ -49,7 +49,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
4949
provider: azure
5050
parameters:
5151
usePodIdentity: "true" # Set to true for using aad-pod-identity to access your key vault
52-
keyvaultName: <key-vault-name> # Set to the name of your Azure key vault instance
52+
keyvaultName: <key-vault-name> # Set to the name of your key vault
5353
cloudName: "" # [OPTIONAL for Azure] if not provided, the Azure environment defaults to AzurePublicCloud
5454
objects: |
5555
array:
@@ -61,7 +61,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
6161
objectName: key1
6262
objectType: key
6363
objectVersion: ""
64-
tenantId: <tenant-Id> # The tenant ID of the Azure key vault instance
64+
tenantId: <tenant-Id> # The tenant ID of the key vault
6565
```
6666
6767
1. Apply the `SecretProviderClass` to your cluster:
@@ -108,7 +108,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
108108
109109
## Use a user-assigned managed identity
110110
111-
1. To access your key vault instance, you can use the user-assigned managed identity that you created when you [enabled a managed identity on your AKS cluster][use-managed-identity]:
111+
1. To access your key vault, you can use the user-assigned managed identity that you created when you [enabled a managed identity on your AKS cluster][use-managed-identity]:
112112
113113
```azurecli-interactive
114114
az aks show -g <resource-group> -n <cluster-name> --query identityProfile.kubeletidentity.clientId -o tsv
@@ -122,7 +122,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
122122
az vm identity assign -g <resource-group> -n <agent-pool-vm> --identities <identity-resource-id>
123123
```
124124
125-
1. To grant your identity permissions that enable it to read your key vault instance and view its contents, run the following commands:
125+
1. To grant your identity permissions that enable it to read your key vault and view its contents, run the following commands:
126126
127127
```azurecli-interactive
128128
# set policy to access keys in your key vault
@@ -133,7 +133,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
133133
az keyvault set-policy -n <keyvault-name> --certificate-permissions get --spn <identity-client-id>
134134
```
135135
136-
1. Create a `SecretProviderClass` by using the following YAML, using your own values for `userAssignedIdentityID`, `keyvaultName`, `tenantId`, and the objects to retrieve from your key vault instance:
136+
1. Create a `SecretProviderClass` by using the following YAML, using your own values for `userAssignedIdentityID`, `keyvaultName`, `tenantId`, and the objects to retrieve from your key vault:
137137
138138
```yml
139139
# This is a SecretProviderClass example using user-assigned identity to access your key vault
@@ -147,7 +147,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
147147
usePodIdentity: "false"
148148
useVMManagedIdentity: "true" # Set to true for using managed identity
149149
userAssignedIdentityID: <client-id> # Set the clientID of the user-assigned managed identity to use
150-
keyvaultName: <key-vault-name> # Set to the name of your Azure key vault instance
150+
keyvaultName: <key-vault-name> # Set to the name of your key vault
151151
cloudName: "" # [OPTIONAL for Azure] if not provided, the Azure environment defaults to AzurePublicCloud
152152
objects: |
153153
array:
@@ -159,7 +159,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
159159
objectName: key1
160160
objectType: key
161161
objectVersion: ""
162-
tenantId: <tenant-id> # The tenant ID of the Azure key vault instance
162+
tenantId: <tenant-id> # The tenant ID of the key vault
163163
```
164164
165165
1. Apply the `SecretProviderClass` to your cluster:
@@ -219,7 +219,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
219219
220220
The output should contain `type: SystemAssigned`. Make a note of the `principalId`.
221221
222-
1. To grant your identity permissions that enable it to read your key vault instance and view its contents, run the following commands:
222+
1. To grant your identity permissions that enable it to read your key vault and view its contents, run the following commands:
223223
224224
```azurecli-interactive
225225
# set policy to access keys in your key vault
@@ -230,7 +230,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
230230
az keyvault set-policy -n <keyvault-name> --certificate-permissions get --spn <identity-principal-id>
231231
```
232232
233-
1. Create a `SecretProviderClass` by using the following YAML, using your own values for `keyvaultName`, `tenantId`, and the objects to retrieve from your key vault instance:
233+
1. Create a `SecretProviderClass` by using the following YAML, using your own values for `keyvaultName`, `tenantId`, and the objects to retrieve from your key vault:
234234
235235
```yml
236236
# This is a SecretProviderClass example using system-assigned identity to access your key vault
@@ -256,7 +256,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
256256
objectName: key1
257257
objectType: key
258258
objectVersion: ""
259-
tenantId: <tenant-id> # The tenant ID of the Azure key vault instance
259+
tenantId: <tenant-id> # The tenant ID of the key vault
260260
```
261261
262262
1. Apply the `SecretProviderClass` to your cluster:

0 commit comments

Comments
 (0)