You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/workload-identity-deploy-cluster.md
+33-31Lines changed: 33 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Deploy and configure an Azure Kubernetes Service (AKS) cluster with workl
3
3
description: In this Azure Kubernetes Service (AKS) article, you deploy an Azure Kubernetes Service cluster and configure it with an Azure AD workload identity (preview).
4
4
ms.topic: article
5
5
ms.custom: devx-track-azurecli
6
-
ms.date: 01/11/2023
6
+
ms.date: 03/14/2023
7
7
---
8
8
9
9
# Deploy and configure workload identity (preview) on an Azure Kubernetes Service (AKS) cluster
@@ -66,7 +66,7 @@ Create an AKS cluster using the [az aks create][az-aks-create] command with the
66
66
```azurecli-interactive
67
67
az group create --name myResourceGroup --location eastus
68
68
69
-
az aks create -g myResourceGroup -n myAKSCluster --node-count 1 --enable-oidc-issuer --enable-workload-identity --generate-ssh-keys
69
+
az aks create -g myResourceGroup -n myAKSCluster --enable-oidc-issuer --enable-workload-identity
70
70
```
71
71
72
72
After a few minutes, the command completes and returns JSON-formatted information about the cluster.
@@ -80,38 +80,18 @@ To get the OIDC Issuer URL and save it to an environmental variable, run the fol
80
80
export AKS_OIDC_ISSUER="$(az aks show -n myAKSCluster -g myResourceGroup --query "oidcIssuerProfile.issuerUrl" -otsv)"
81
81
```
82
82
83
-
## Create a managed identity and grant permissions to access Azure Key Vault
83
+
## Create a managed identity
84
84
85
-
This step is necessary if you need to access secrets, keys, and certificates that are mounted in Azure Key Vault from a pod. Perform the following steps to configure access with a managed identity. These steps assume you have an Azure Key Vault already created and configured in your subscription. If you don't have one, see [Create an Azure Key Vault using the Azure CLI][create-key-vault-azure-cli].
86
-
87
-
Before proceeding, you need the following information:
88
-
89
-
* Name of the Key Vault
90
-
* Resource group holding the Key Vault
85
+
Use the Azure CLI [az account set][az-account-set] command to set a specific subscription to be the current active subscription. Then use the [az identity create][az-identity-create] command to create a managed identity.
91
86
92
-
You can retrieve this information using the Azure CLI command: [az keyvault list][az-keyvault-list].
93
-
94
-
1. Use the Azure CLI [az account set][az-account-set] command to set a specific subscription to be the current active subscription. Then use the [az identity create][az-identity-create] command to create a managed identity.
95
-
96
-
```azurecli
97
-
export SUBSCRIPTION_ID="$(az account show --query id --output tsv)"
## Optional - Grant permissions to access Azure Key Vault
150
+
151
+
This step is necessary if you need to access secrets, keys, and certificates that are mounted in Azure Key Vault from a pod. Perform the following steps to configure access with a managed identity. These steps assume you have an Azure Key Vault already created and configured in your subscription. If you don't have one, see [Create an Azure Key Vault using the Azure CLI][create-key-vault-azure-cli].
152
+
153
+
Before proceeding, you need the following information:
154
+
155
+
* Name of the Key Vault
156
+
* Resource group holding the Key Vault
157
+
158
+
You can retrieve this information using the Azure CLI command: [az keyvault list][az-keyvault-list].
159
+
160
+
1. Set an access policy for the managed identity to access secrets in your Key Vault by running the following commands:
Copy file name to clipboardExpand all lines: articles/aks/workload-identity-migrate-from-pod-identity.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,14 @@
1
1
---
2
-
title: Modernize your Azure Kubernetes Service (AKS) application to use workload identity (preview)
2
+
title: Migrate your Azure Kubernetes Service (AKS) pod to use workload identity (preview)
3
3
description: In this Azure Kubernetes Service (AKS) article, you learn how to configure your Azure Kubernetes Service pod to authenticate with workload identity.
4
4
ms.topic: article
5
5
ms.custom: devx-track-azurecli
6
-
ms.date: 02/08/2023
6
+
ms.date: 03/14/2023
7
7
---
8
8
9
-
# Modernize application authentication with workload identity (preview)
9
+
# Migrate from pod managed-identity to workload identity (preview)
10
10
11
-
This article focuses on pod-managed identity migration to Azure Active Directory (Azure AD) workload identity (preview) for your Azure Kubernetes Service (AKS) cluster. It also provides guidance depending on the version of the [Azure Identity][azure-identity-supported-versions] client library used by your container-based application.
11
+
This article focuses on migrating from a pod-managed identity to Azure Active Directory (Azure AD) workload identity (preview) for your Azure Kubernetes Service (AKS) cluster. It also provides guidance depending on the version of the [Azure Identity][azure-identity-supported-versions] client library used by your container-based application.
12
12
13
13
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
14
14
@@ -30,10 +30,10 @@ For either scenario, you need to have the federated trust set up before you upda
30
30
31
31
If your cluster is already using the latest version of the Azure Identity SDK, perform the following steps to complete the authentication configuration:
32
32
33
-
- Deploy workload identity in parallel to where the trust is setup. You can restart your application deployment to begin using the workload identity, where it injects the OIDC annotations into the application automatically.
33
+
- Deploy workload identity in parallel with pod-managed identity. You can restart your application deployment to begin using the workload identity, where it injects the OIDC annotations into the application automatically.
34
34
- After verifying the application is able to authenticate successfully, you can [remove the pod-managed identity](#remove-pod-managed-identity) annotations from your application and then remove the pod-managed identity add-on.
35
35
36
-
## Migrate from older version
36
+
###Migrate from older version
37
37
38
38
If your cluster isn't using the latest version of the Azure Identity SDK, you have two options:
39
39
@@ -65,7 +65,7 @@ If you don't have a managed identity created and assigned to your pod, perform t
2. Grant the managed identity the permissions required to access the resources in Azure it requires.
68
+
2. Grant the managed identity the permissions required to access the resources in Azure it requires. For information on how to do this, see [Assign a managed identity access to a resource][assign-rbac-managed-identity].
69
69
70
70
3. To get the OIDC Issuer URL and save it to an environmental variable, run the following command. Replace the default values for the cluster name and the resource group name.
71
71
@@ -208,6 +208,7 @@ This article showed you how to set up your pod to authenticate using a workload
Copy file name to clipboardExpand all lines: articles/aks/workload-identity-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Use an Azure AD workload identities (preview) on Azure Kubernetes Service (AKS)
3
3
description: Learn about Azure Active Directory workload identity (preview) for Azure Kubernetes Service (AKS) and how to migrate your application to authenticate using this identity.
0 commit comments