Skip to content

Commit 775e7c6

Browse files
Merge pull request #227509 from rwike77/ficlimits
updated concurrent updates
2 parents 2a82ae2 + b36ef73 commit 775e7c6

File tree

1 file changed

+10
-6
lines changed

1 file changed

+10
-6
lines changed

articles/active-directory/develop/workload-identity-federation-considerations.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 09/27/2022
12+
ms.date: 02/15/2022
1313
ms.author: ryanwi
14-
ms.reviewer: shkhalid, udayh, vakarand, cbrooks
14+
ms.reviewer: shkhalid, udayh, cbrooks
1515
ms.custom: aaddev, references_regions
1616

1717
---
@@ -52,7 +52,7 @@ Resources in these regions can still use federated identity credentials created
5252

5353
*Applies to: applications and user-assigned managed identities (public preview)*
5454

55-
Only issuers that provide tokens signed using the RS256 algorithm are supported for token exchange using workload identity federation. Exchanging tokens signed with other algorithms may work, but have not been tested.
55+
Only issuers that provide tokens signed using the RS256 algorithm are supported for token exchange using workload identity federation. Exchanging tokens signed with other algorithms may work, but haven't been tested.
5656

5757
## Azure Active Directory issuers aren't supported
5858

@@ -81,9 +81,13 @@ To avoid this issue, wait a short time after adding the federated identity crede
8181

8282
Creating multiple federated identity credentials under the same user-assigned managed identity concurrently triggers concurrency detection logic, which causes requests to fail with 409-conflict HTTP status code.
8383

84+
[Terraform Provider for Azure (Resource Manager)](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs) version 3.40.0 introduces an [update](https://github.com/hashicorp/terraform-provider-azurerm/pull/20003) which creates multiple federated identity credentials sequentially instead of concurrently. Versions earlier than 3.40.0 can cause failures in pipelines when multiped federated identities are created. We recommend you use [Terraform Provider for Azure (Resource Manager) v3.40.0](https://github.com/hashicorp/terraform-provider-azurerm/tree/main) or later so that multiple federated identity credentials are created sequentially.
85+
8486
When you use automation or Azure Resource Manager templates (ARM templates) to create federated identity credentials under the same parent identity, create the federated credentials sequentially. Federated identity credentials under different managed identities can be created in parallel without any restrictions.
8587

86-
The following Azure Resource Manager template (ARM template) example creates three new federated identity credentials sequentially on a user-assigned managed identity by using the *dependsOn* property:
88+
If federated identity credentials are provisioned in a loop, you can [provision them serially](/azure/azure-resource-manager/templates/copy-resources#serial-or-parallel) by setting *"mode": "serial"*.
89+
90+
You can also provision multiple new federated identity credentials sequentially using the *dependsOn* property. The following Azure Resource Manager template (ARM template) example creates three new federated identity credentials sequentially on a user-assigned managed identity by using the *dependsOn* property:
8791

8892
```json
8993
{
@@ -158,7 +162,7 @@ The following Azure Resource Manager template (ARM template) example creates thr
158162

159163
*Applies to: applications and user-assigned managed identities (public preview)*
160164

161-
It is possible to use a deny [Azure Policy](../../governance/policy/overview.md) as in the following ARM template example:
165+
It's possible to use a deny [Azure Policy](../../governance/policy/overview.md) as in the following ARM template example:
162166

163167
```json
164168
{
@@ -196,7 +200,7 @@ The following error codes may be returned when creating, updating, getting, list
196200
| HTTP code | Error message | Comments |
197201
|-------------------|----------------|----------------|
198202
| 405 | The request format was unexpected: Support for federated identity credentials not enabled. | Federated identity credentials aren't enabled in this region. Refer to “Currently Supported regions”. |
199-
| 400 | Federated identity credentials must have exactly 1 audience.| Currently, federated identity credentials support a single audience “api://AzureADTokenExchange”.|
203+
| 400 | Federated identity credentials must have exactly one audience.| Currently, federated identity credentials support a single audience “api://AzureADTokenExchange”.|
200204
| 400 | Federated Identity Credential from HTTP body has empty properties | All federated identity credential properties are mandatory. |
201205
| 400 | Federated Identity Credential name '{ficName}' is invalid. | Alphanumeric, dash, underscore, no more than 3-120 symbols. First symbol is alphanumeric. |
202206
| 404 | The parent user-assigned identity doesn't exist. | Check user assigned identity name in federated identity credentials resource path. |

0 commit comments

Comments
 (0)