You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/workload-identity-federation-create-trust-user-assigned-managed-identity.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -123,7 +123,7 @@ For a workflow triggered by a pull request event, specify an **Entity type** of
123
123
124
124
Fill in the **Cluster issuer URL**, **Namespace**, **Service account name**, and **Name** fields:
125
125
126
-
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer-preview) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
126
+
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
127
127
- **Service account name** is the name of the Kubernetes service account, which provides an identity for processes that run in a Pod.
128
128
- **Namespace** is the service account namespace.
129
129
- **Name** is the name of the federated credential, which can't be changed later.
- For information about the required format of JWTs created by external identity providers, read about the [assertion format](active-directory-certificate-credentials.md#assertion-format).
507
+
- For information about the required format of JWTs created by external identity providers, read about the [assertion format](active-directory-certificate-credentials.md#assertion-format).
Copy file name to clipboardExpand all lines: articles/active-directory/develop/workload-identity-federation-create-trust.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,7 +128,7 @@ Select the **Kubernetes accessing Azure resources** scenario from the dropdown m
128
128
129
129
Fill in the **Cluster issuer URL**, **Namespace**, **Service account name**, and **Name** fields:
130
130
131
-
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer-preview) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
131
+
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
132
132
- **Service account name** is the name of the Kubernetes service account, which provides an identity for processes that run in a Pod.
133
133
- **Namespace** is the service account namespace.
134
134
- **Name** is the name of the federated credential, which can't be changed later.
@@ -202,7 +202,7 @@ az ad app federated-credential create --id f6475511-fd81-4965-a00e-41e7792b7b9c
202
202
203
203
### Kubernetes example
204
204
205
-
*issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer-preview) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
205
+
*issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
206
206
207
207
*subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
- *ApplicationObjectId*: the object ID of the app (not the application (client) ID) you previously registered in Azure AD.
349
-
- *Issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer-preview) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
349
+
- *Issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
350
350
- *Subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
351
351
- *Name* is the name of the federated credential, which can't be changed later.
352
352
- *Audience* lists the audiences that can appear in the `aud` claim of the external token.
@@ -446,7 +446,7 @@ And you get the response:
446
446
447
447
Run the following method to configure a federated identity credential on an app and create a trust relationship with a Kubernetes service account. Specify the following parameters:
448
448
449
-
- *issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer-preview) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
449
+
- *issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
450
450
- *subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
451
451
- *name* is the name of the federated credential, which can't be changed later.
452
452
- *audiences* lists the audiences that can appear in the external token. This field is mandatory. The recommended value is "api://AzureADTokenExchange".
@@ -570,4 +570,4 @@ az rest -m DELETE -u 'https://graph.microsoft.com/applications/f6475511-fd81-49
570
570
- To learn how to use workload identity federation for GitHub Actions, see [Configure a GitHub Actions workflow to get an access token](/azure/developer/github/connect-from-azure).
571
571
- Read the [GitHub Actions documentation](https://docs.github.com/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-azure) to learn more about configuring your GitHub Actions workflow to get an access token from Microsoft identity provider and access Azure resources.
572
572
- For more information, read about how Azure AD uses the [OAuth 2.0 client credentials grant](v2-oauth2-client-creds-grant-flow.md#third-case-access-token-request-with-a-federated-credential) and a client assertion issued by another IdP to get a token.
573
-
- For information about the required format of JWTs created by external identity providers, read about the [assertion format](active-directory-certificate-credentials.md#assertion-format).
573
+
- For information about the required format of JWTs created by external identity providers, read about the [assertion format](active-directory-certificate-credentials.md#assertion-format).
description: Learn how to configure a cluster in Azure Kubernetes Service (AKS)
4
4
services: container-service
5
5
ms.topic: article
6
-
ms.date: 09/29/2022
6
+
ms.date: 10/04/2022
7
7
---
8
8
9
9
# Configure an AKS cluster
@@ -190,36 +190,17 @@ To remove Node Restriction from a cluster.
190
190
az aks update -n aks -g myResourceGroup --disable-node-restriction
191
191
```
192
192
193
-
## OIDC Issuer (Preview)
193
+
## OIDC Issuer
194
194
195
195
This enables an OIDC Issuer URL of the provider which allows the API server to discover public signing keys.
196
196
197
197
> [!WARNING]
198
-
> Enable/disable OIDC Issuer changes the current service account token issuer to a new value, which causes some down time and make API server restart. If the application pods based on service account token keep in failed status after enable/disable OIDC Issuer, it's recommended to restart the pods manually.
198
+
> Enable or disable OIDC Issuer changes the current service account token issuer to a new value, which can cause down time and restarts the API server. If the application pods using a service token remain in a failed state after you enable or disable the OIDC Issuer, we recommend you manually restart the pods.
199
199
200
-
### Before you begin
201
-
202
-
You must have the following resource installed:
203
-
204
-
* The Azure CLI
205
-
* The `aks-preview` extension version 0.5.50 or higher
206
-
* Kubernetes version 1.19.x or higher
207
-
208
-
### Install the aks-preview Azure CLI extension
209
-
210
-
[!INCLUDE [preview features callout](includes/preview/preview-callout.md)]
211
-
212
-
To install the aks-preview extension, run the following command:
213
-
214
-
```azurecli
215
-
az extension add --name aks-preview
216
-
```
217
-
218
-
Run the following command to update to the latest version of the extension released:
200
+
### Prerequisites
219
201
220
-
```azurecli
221
-
az extension update --name aks-preview
222
-
```
202
+
* The Azure CLI version 2.42.0 or higher. Run `az --version` to find your version. If you need to install or upgrade, see [Install Azure CLI][azure-cli-install].
203
+
* AKS version 1.22 and higher. If your cluster is running version 1.21 and the OIDC Issuer preview is enabled, we recommend you upgrade the cluster to the minimum required version supported.
223
204
224
205
### Create an AKS cluster with OIDC Issuer
225
206
@@ -245,9 +226,20 @@ To get the OIDC Issuer URL, run the following command. Replace the default value
245
226
az aks show -n myAKScluster -g myResourceGroup --query "oidcIssuerProfile.issuerUrl" -otsv
246
227
```
247
228
229
+
### Rotate the OIDC key
230
+
231
+
To rotate the OIDC key, perform the following command. Replace the default values for the cluster name and the resource group name.
232
+
233
+
```azurecli-interactive
234
+
az aks oidc-issuer rotate-signing-keys -n myAKSCluster -g myResourceGroup
235
+
```
236
+
237
+
> [!Important]
238
+
> Once you rotate the key, the old key (key1) expires after 24 hours. This means that both the old key (key1) and the new key (key2) are valid within the 24-hour period. If you want to invalidate the old key (key1) immediately, you need to rotate the OIDC key twice. Then key2 and key3 are valid, and key1 is invalid.
239
+
248
240
## Next steps
249
241
250
-
- Learn how [upgrade the node images](node-image-upgrade.md) in your cluster.
242
+
- Learn how to [upgrade the node images](node-image-upgrade.md) in your cluster.
251
243
- See [Upgrade an Azure Kubernetes Service (AKS) cluster](upgrade-cluster.md) to learn how to upgrade your cluster to the latest version of Kubernetes.
252
244
- Read more about [`containerd` and Kubernetes](https://kubernetes.io/blog/2018/05/24/kubernetes-containerd-integration-goes-ga/)
253
245
- See the list of [Frequently asked questions about AKS](faq.md) to find answers to some common AKS questions.
0 commit comments