You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/reference-kubernetes-provider.md
+39-4Lines changed: 39 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,6 +38,13 @@ If the `spec.auth` property isn't set, the system-assigned managed identity is u
38
38
|---|---|---|---|
39
39
|managedIdentityClientId|The Client ID of user-assigned managed identity|false|string|
40
40
|servicePrincipalReference|The name of the Kubernetes Secret that contains the credentials of a service principal|false|string|
41
+
|workloadIdentity|The settings for using workload identity|false|object|
42
+
43
+
The `spec.auth.workloadIdentity` property has the following child property.
44
+
45
+
|Name|Description|Required|Type|
46
+
|---|---|---|---|
47
+
|managedIdentityClientId|The Client ID of user-assigned managed identity|true|string|
41
48
42
49
The `spec.keyValues` has the following child properties. The `spec.keyValues.keyVaults` property is required if any Key Vault references are expected to be downloaded.
43
50
@@ -74,15 +81,17 @@ If the `spec.keyValues.keyVaults.auth` property isn't set, the system-assigned m
74
81
|---|---|---|---|
75
82
|managedIdentityClientId|The client ID of a user-assigned managed identity used for authentication with vaults that don't have individual authentication methods specified|false|string|
76
83
|servicePrincipalReference|The name of the Kubernetes Secret that contains the credentials of a service principal used for authentication with vaults that don't have individual authentication methods specified|false|string|
84
+
|workloadIdentity|The settings for using workload identity for authentication with vaults that don't have individual authentication methods specified|false|object|
77
85
|vaults|The authentication methods for individual vaults|false|object array|
78
86
79
-
The authentication method of each *vault* can be specified with the following properties. One of `managedIdentityClientId` and `servicePrincipalReference` must be provided.
87
+
The authentication method of each *vault* can be specified with the following properties. One of `managedIdentityClientId`, `servicePrincipalReference` or `workloadIdentity` must be provided.
80
88
81
89
|Name|Description|Required|Type|
82
90
|---|---|---|---|
83
91
|uri|The URI of a vault|true|string|
84
92
|managedIdentityClientId|The client ID of a user-assigned managed identity used for authentication with a vault|false|string|
85
93
|servicePrincipalReference|The name of the Kubernetes Secret that contains the credentials of a service principal used for authentication with a vault|false|string|
94
+
|workloadIdentity|The settings for using workload identity for authentication with a vault|false|object|
86
95
87
96
The `spec.keyValues.refresh` property has the following child properties.
88
97
@@ -119,7 +128,7 @@ The `spec.keyValues.refresh.monitoring.keyValues` is an array of objects, which
#### Use User-Assigned Managed Identity at cluster level
123
132
124
133
1. [Create a user-assigned managed identity](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities#create-a-user-assigned-managed-identity) and note down its client ID after creation.
125
134
1. [Assign the user-assigned managed identity to the virtual machine scale set](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vmss#user-assigned-managed-identity) used by the Azure Kubernetes Service (AKS) cluster.
@@ -139,7 +148,7 @@ The `spec.keyValues.refresh.monitoring.keyValues` is an array of objects, which
1. [Create a Service Principal](/azure/active-directory/develop/howto-create-service-principal-portal)
145
154
1. [Grant the service principal **App Configuration Data Reader** role](/azure/azure-app-configuration/howto-integrate-azure-managed-service-identity#grant-access-to-app-configuration) in Azure App Configuration.
@@ -159,10 +168,36 @@ The `spec.keyValues.refresh.monitoring.keyValues` is an array of objects, which
1. [Enable Workload Identity](/azure/aks/workload-identity-deploy-cluster#update-an-existing-aks-cluster) on the Azure Kubernetes Service (AKS) cluster.
174
+
1. [Get the OIDC issuer URL](/azure/aks/workload-identity-deploy-cluster#retrieve-the-oidc-issuer-url) of the AKS cluster.
175
+
1. [Create a user-assigned managed identity](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities#create-a-user-assigned-managed-identity) and note down its client ID after creation.
176
+
1. Create the federated identity credential between the managed identity, OIDC issuer, and subject using the az identity federated-credential create command.
1. [Grant the user-assigned managed identity **App Configuration Data Reader** role](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vmss#user-assigned-managed-identity) in Azure App Configuration.
181
+
1. Set the `spec.auth.workloadIdentity.managedIdentityClientId` property to the client ID of the user-assigned managed identity in the following sample `AzureAppConfigurationProvider` resource and deploy it to the AKS cluster.
1. Create a Kubernetes Secret in the same namespace as the `AzureAppConfigurationProvider` resource and add Azure App Configuration connection string with key *azure_app_configuration_connection_string* in the Secret.
165
-
2. Set the `spec.connectionStringReference` property to the name of the Secret in the following sample `AzureAppConfigurationProvider` resource and deploy it to the Kubernetes cluster.
200
+
1. Set the `spec.connectionStringReference` property to the name of the Secret in the following sample `AzureAppConfigurationProvider` resource and deploy it to the Kubernetes cluster.
0 commit comments