Skip to content

Commit b205c7d

Browse files
author
Justin
committed
callout OSS projects on best practices
1 parent cf157d3 commit b205c7d

File tree

1 file changed

+9
-6
lines changed

1 file changed

+9
-6
lines changed

articles/aks/developer-best-practices-pod-security.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -66,14 +66,17 @@ Work with your cluster operator to determine what security context settings you
6666
6767
To limit the risk of credentials being exposed in your application code, avoid the use of fixed or shared credentials. Credentials or keys shouldn't be included directly in your code. If these credentials are exposed, the application needs to be updated and redeployed. A better approach is to give pods their own identity and way to authenticate themselves, or automatically retrieve credentials from a digital vault.
6868
69-
The following [associated AKS open source projects][aks-associated-projects] let you automatically authenticate pods or request credentials and keys from a digital vault:
69+
### Open-source solutions for dev/test
7070
71-
* Managed identities for Azure resources, and
72-
* [Azure Key Vault Provider for Secrets Store CSI Driver](https://github.com/Azure/secrets-store-csi-driver-provider-azure#usage)
71+
> [!NOTE] Associated AKS open source projects are not supported by Azure technical support. They are provided to gather feedback and bugs from our community. These projects are not recommended for production use, but are evaluated for inclusion into AKS as a first class feature over time.
7372
74-
Associated AKS open source projects are not supported by Azure technical support. They are provided to gather feedback and bugs from our community. These projects are not recommended for production use.
73+
The following [associated AKS open source projects][aks-associated-projects] let you automatically authenticate pods or request credentials and keys from a digital vault.
7574
76-
### Use pod managed identities
75+
* Managed identities for Azure resources
76+
* [AAD Pod Identity][aad-pod-identity]
77+
* [Azure Key Vault Provider for Secrets Store CSI Driver](https://github.com/Azure/secrets-store-csi-driver-provider-azure#usage)
78+
79+
#### Use pod managed identities
7780
7881
A managed identity for Azure resources lets a pod authenticate itself against Azure services that support it, such as Storage or SQL. The pod is assigned an Azure Identity that lets them authenticate to Azure Active Directory and receive a digital token. This digital token can be presented to other Azure services that check if the pod is authorized to access the service and perform the required actions. This approach means that no secrets are required for database connection strings, for example. The simplified workflow for pod managed identity is shown in the following diagram:
7982
@@ -83,7 +86,7 @@ With a managed identity, your application code doesn't need to include credentia
8386
8487
For more information about pod identities, see [Configure an AKS cluster to use pod managed identities and with your applications][aad-pod-identity]
8588
86-
### Use Azure Key Vault with Secrets Store CSI Driver
89+
#### Use Azure Key Vault with Secrets Store CSI Driver
8790
8891
Using the pod identity project enables authentication against supporting Azure services. For your own services or applications without managed identities for Azure resources, you can still authenticate using credentials or keys. A digital vault can be used to store these secret contents.
8992

0 commit comments

Comments
 (0)