You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/csi-secrets-store-identity-access.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
26
26
27
27
1. Follow the instructions in [Use Azure Active Directory pod-managed identities in Azure Kubernetes Service (Preview)][aad-pod-identity-create] to create a cluster identity, assign it permissions, and create a pod identity. Take note of the newly created identity's `clientId` and `name`.
28
28
29
-
1. Assign permissions to the new identity to enable it to read your key vault instance and view its contents by running the following commands:
29
+
1. Assign permissions to the new identity to enable it to read your key vault and view its contents by running the following commands:
30
30
31
31
```azurecli-interactive
32
32
# set policy to access keys in your key vault
@@ -37,7 +37,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
37
37
az keyvault set-policy -n <keyvault-name> --certificate-permissions get --spn <pod-identity-client-id>
38
38
```
39
39
40
-
1. Create a `SecretProviderClass` by using the following YAML, using your own values for `aadpodidbinding`, `tenantId`, and the objects to retrieve from your key vault instance:
40
+
1. Create a `SecretProviderClass` by using the following YAML, using your own values for `aadpodidbinding`, `tenantId`, and the objects to retrieve from your key vault:
41
41
42
42
```yml
43
43
# This is a SecretProviderClass example using aad-pod-identity to access the key vault
@@ -49,7 +49,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
49
49
provider: azure
50
50
parameters:
51
51
usePodIdentity: "true" # Set to true for using aad-pod-identity to access your key vault
52
-
keyvaultName: <key-vault-name> # Set to the name of your Azure key vault instance
52
+
keyvaultName: <key-vault-name> # Set to the name of your key vault
53
53
cloudName: "" # [OPTIONAL for Azure] if not provided, the Azure environment defaults to AzurePublicCloud
54
54
objects: |
55
55
array:
@@ -61,7 +61,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
61
61
objectName: key1
62
62
objectType: key
63
63
objectVersion: ""
64
-
tenantId: <tenant-Id> # The tenant ID of the Azure key vault instance
64
+
tenantId: <tenant-Id> # The tenant ID of the key vault
65
65
```
66
66
67
67
1. Apply the `SecretProviderClass` to your cluster:
@@ -108,7 +108,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
108
108
109
109
## Use a user-assigned managed identity
110
110
111
-
1. To access your key vault instance, you can use the user-assigned managed identity that you created when you [enabled a managed identity on your AKS cluster][use-managed-identity]:
111
+
1. To access your key vault, you can use the user-assigned managed identity that you created when you [enabled a managed identity on your AKS cluster][use-managed-identity]:
112
112
113
113
```azurecli-interactive
114
114
az aks show -g <resource-group> -n <cluster-name> --query identityProfile.kubeletidentity.clientId -o tsv
@@ -122,7 +122,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
122
122
az vm identity assign -g <resource-group> -n <agent-pool-vm> --identities <identity-resource-id>
123
123
```
124
124
125
-
1. To grant your identity permissions that enable it to read your key vault instance and view its contents, run the following commands:
125
+
1. To grant your identity permissions that enable it to read your key vault and view its contents, run the following commands:
126
126
127
127
```azurecli-interactive
128
128
# set policy to access keys in your key vault
@@ -133,7 +133,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
133
133
az keyvault set-policy -n <keyvault-name> --certificate-permissions get --spn <identity-client-id>
134
134
```
135
135
136
-
1. Create a `SecretProviderClass` by using the following YAML, using your own values for `userAssignedIdentityID`, `keyvaultName`, `tenantId`, and the objects to retrieve from your key vault instance:
136
+
1. Create a `SecretProviderClass` by using the following YAML, using your own values for `userAssignedIdentityID`, `keyvaultName`, `tenantId`, and the objects to retrieve from your key vault:
137
137
138
138
```yml
139
139
# This is a SecretProviderClass example using user-assigned identity to access your key vault
@@ -147,7 +147,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
147
147
usePodIdentity: "false"
148
148
useVMManagedIdentity: "true" # Set to true for using managed identity
149
149
userAssignedIdentityID: <client-id> # Set the clientID of the user-assigned managed identity to use
150
-
keyvaultName: <key-vault-name> # Set to the name of your Azure key vault instance
150
+
keyvaultName: <key-vault-name> # Set to the name of your key vault
151
151
cloudName: "" # [OPTIONAL for Azure] if not provided, the Azure environment defaults to AzurePublicCloud
152
152
objects: |
153
153
array:
@@ -159,7 +159,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
159
159
objectName: key1
160
160
objectType: key
161
161
objectVersion: ""
162
-
tenantId: <tenant-id> # The tenant ID of the Azure key vault instance
162
+
tenantId: <tenant-id> # The tenant ID of the key vault
163
163
```
164
164
165
165
1. Apply the `SecretProviderClass` to your cluster:
@@ -219,7 +219,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
219
219
220
220
The output should contain `type: SystemAssigned`. Make a note of the `principalId`.
221
221
222
-
1. To grant your identity permissions that enable it to read your key vault instance and view its contents, run the following commands:
222
+
1. To grant your identity permissions that enable it to read your key vault and view its contents, run the following commands:
223
223
224
224
```azurecli-interactive
225
225
# set policy to access keys in your key vault
@@ -230,7 +230,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
230
230
az keyvault set-policy -n <keyvault-name> --certificate-permissions get --spn <identity-principal-id>
231
231
```
232
232
233
-
1. Create a `SecretProviderClass` by using the following YAML, using your own values for `keyvaultName`, `tenantId`, and the objects to retrieve from your key vault instance:
233
+
1. Create a `SecretProviderClass` by using the following YAML, using your own values for `keyvaultName`, `tenantId`, and the objects to retrieve from your key vault:
234
234
235
235
```yml
236
236
# This is a SecretProviderClass example using system-assigned identity to access your key vault
@@ -256,7 +256,7 @@ Azure Active Directory (Azure AD) pod-managed identities use AKS primitives to a
256
256
objectName: key1
257
257
objectType: key
258
258
objectVersion: ""
259
-
tenantId: <tenant-id> # The tenant ID of the Azure key vault instance
259
+
tenantId: <tenant-id> # The tenant ID of the key vault
260
260
```
261
261
262
262
1. Apply the `SecretProviderClass` to your cluster:
0 commit comments