Skip to content

Commit ab97034

Browse files
authored
Update workload-identity-overview.md
1 parent 3ce3add commit ab97034

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

articles/aks/workload-identity-overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,6 @@ If you've used [Azure AD pod-managed identity][use-azure-ad-pod-identity], think
9393

9494
|Annotation |Description |Default |
9595
|-----------|------------|--------|
96-
|`azure.workload.identity/use` |Represents the service account<br> is to be used for workload identity. | |
9796
|`azure.workload.identity/service-account-token-expiration` |Represents the `expirationSeconds` field for the projected service account token. It's an optional field that you configure to prevent any downtime caused by errors during service account token refresh. Kubernetes service account token expiry isn't correlated with Azure AD tokens. Azure AD tokens expire in 24 hours after they're issued. <sup>1</sup> |3600<br> Supported range is 3600-86400. |
9897
|`azure.workload.identity/skip-containers` |Represents a semi-colon-separated list of containers to skip adding projected service account token volume. For example `container1;container2`. |By default, the projected service account token volume is added to all containers if the service account is labeled with `azure.workload.identity/use: true`. |
9998
|`azure.workload.identity/inject-proxy-sidecar` |Injects a proxy init container and proxy sidecar into the pod. The proxy sidecar is used to intercept token requests to IMDS and acquire an Azure AD token on behalf of the user with federated identity credential. |true |

0 commit comments

Comments
 (0)