Skip to content

Commit f0f837c

Browse files
authored
fix(aks): Provide doc on azure.workload.identity/use annotation for pods
1 parent ab6d0c0 commit f0f837c

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

articles/aks/workload-identity-overview.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,7 @@ If you've used [Azure AD pod-managed identity][use-azure-ad-pod-identity], think
9292

9393
|Annotation |Description |Default |
9494
|-----------|------------|--------|
95+
|`azure.workload.identity/use` | Represents the pod is to be used for workload identity. |true |Yes |
9596
|`azure.workload.identity/service-account-token-expiration` |Represents the `expirationSeconds` field for the projected service account token. It's an optional field that you configure to prevent any downtime caused by errors during service account token refresh. Kubernetes service account token expiry isn't correlated with Azure AD tokens. Azure AD tokens expire in 24 hours after they're issued. <sup>1</sup> |3600<br> Supported range is 3600-86400. |
9697
|`azure.workload.identity/skip-containers` |Represents a semi-colon-separated list of containers to skip adding projected service account token volume. For example `container1;container2`. |By default, the projected service account token volume is added to all containers if the service account is labeled with `azure.workload.identity/use: true`. |
9798
|`azure.workload.identity/inject-proxy-sidecar` |Injects a proxy init container and proxy sidecar into the pod. The proxy sidecar is used to intercept token requests to IMDS and acquire an Azure AD token on behalf of the user with federated identity credential. |true |

0 commit comments

Comments
 (0)