Skip to content

Commit f1b1aad

Browse files
committed
Updates to doc per GitHub issue feedback
1 parent 5160285 commit f1b1aad

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/aks/csi-secrets-store-identity-access.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,9 @@ In this security model, the AKS cluster acts as token issuer. Microsoft Entra ID
6767
6868
4. Get the AKS cluster OIDC Issuer URL using the [`az aks show`][az-aks-show] command.
6969
70+
> [!NOTE]
71+
> This step assumes you have an existing AKS cluster with the OIDC Issuer URL enabled. If you don't have it enabled, see [Update an AKS cluster with OIDC Issuer](./use-oidc-issuer.md#update-an-aks-cluster-with-oidc-issuer) to enable it.
72+
7073
```bash
7174
export AKS_OIDC_ISSUER="$(az aks show --resource-group $RESOURCE_GROUP --name $CLUSTER_NAME --query "oidcIssuerProfile.issuerUrl" -o tsv)"
7275
echo $AKS_OIDC_ISSUER
@@ -116,11 +119,11 @@ In this security model, the AKS cluster acts as token issuer. Microsoft Entra ID
116119
objects: |
117120
array:
118121
- |
119-
objectName: secret1
122+
objectName: secret1 # Set to the name of your secret
120123
objectType: secret # object types: secret, key, or cert
121124
objectVersion: "" # [OPTIONAL] object versions, default to latest if empty
122125
- |
123-
objectName: key1
126+
objectName: key1 # Set to the name of your key
124127
objectType: key
125128
objectVersion: ""
126129
tenantId: "${IDENTITY_TENANT}" # The tenant ID of the key vault

0 commit comments

Comments
 (0)