Skip to content

Commit ea313ce

Browse files
author
Sreekanth Iyer (Ushta Te Consultancy Services)
committed
Added more features
1 parent 97ce80b commit ea313ce

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/hdinsight-aks/release-notes/hdinsight-aks-release-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ You can refer to [What's new](../whats-new.md) page for all the details of the f
4141

4242
**MSI based SQL authentication**
4343

44-
Users can now authenticate external Azure SQL DB Metastore with MSI instead of User ID password authentication. This fearure helps to further secure the cluster connection with Metastore.
44+
Users can now authenticate external Azure SQL DB Metastore with MSI instead of User ID password authentication. This feature helps to further secure the cluster connection with Metastore.
4545

4646
**Configurable VM SKUs for Head node, SSH**
4747

@@ -70,7 +70,7 @@ For example, one MSI for access to data in storage account and dedicated MSI for
7070
### Known issues
7171

7272
- **Workload identity limitation:**
73-
- There's a known [limitation](/azure/aks/workload-identity-overview#limitations) when transitioning to workload identity. This limitation is due to the permission-sensitive nature of FIC operations. Users can't perform deletion of a cluster by deleting the resource group. Cluster deletion requests must triggered by the application/user/principal with FIC/delete permissions. In case, the FIC deletion fails, the high-level cluster deletion also fails.
73+
- There's a known [limitation](/azure/aks/workload-identity-overview#limitations) when transitioning to workload identity. This limitation is due to the permission-sensitive nature of FIC operations. Users can't perform deletion of a cluster by deleting the resource group. Cluster deletion requests must be triggered by the application/user/principal with FIC/delete permissions. In case, the FIC deletion fails, the high-level cluster deletion also fails.
7474
- **User Assigned Managed Identities (UAMI)** support – There's a limit of 20 FICs per UAMI. You can only create 20 Federated Credentials on an identity. In HDInsight on AKS cluster, FIC (Federated Identity Credential) and SA have one-to-one mapping and only 20 SAs can be created against an MSI. If you want to create more clusters, then you are required to provide different MSIs to overcome the limitation.
7575
- Creation of federated identity credentials is currently not supported on user-assigned managed identities created in [these regions](/entra/workload-id/workload-identity-federation-considerations#unsupported-regions-user-assigned-managed-identities)
7676

0 commit comments

Comments
 (0)