You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/use-managed-identity.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.topic: article
5
5
ms.custom:
6
6
- devx-track-azurecli
7
7
- ignite-2023
8
-
ms.date: 02/27/2024
8
+
ms.date: 03/07/2024
9
9
---
10
10
11
11
# Use a managed identity in Azure Kubernetes Service (AKS)
@@ -24,12 +24,12 @@ When you deploy an AKS cluster, a system-assigned managed identity is automatica
24
24
25
25
AKS doesn't automatically create a [service principal](kubernetes-service-principal.md), so you have to create one. Clusters that use a service principal eventually expire, and the service principal must be renewed to avoid impacting cluster authentication with the identity. Managing service principals adds complexity, so it's easier to use managed identities instead. The same permission requirements apply for both service principals and managed identities. Managed identities use certificate-based authentication. Each managed identity's credentials have an expiration of *90 days* and are rolled after *45 days*.
26
26
27
-
AKS uses both system-assigned and user-assigned managed identity types, and these identities are immutable.
27
+
AKS uses both system-assigned and user-assigned managed identity types, and these identities are immutable. These identity types shouldn't be confused with a [Microsoft Entra Workload identity][workload-identity-overview], which is intended for use by an application running on a pod.
28
28
29
29
> [!IMPORTANT]
30
30
> The open source [Microsoft Entra pod-managed identity][entra-id-pod-managed-identity] (preview) in Azure Kubernetes Service was deprecated on 10/24/2022, and the project archived in Sept. 2023. For more information, see the [deprecation notice](https://github.com/Azure/aad-pod-identity#-announcement). The AKS Managed add-on begins deprecation in Sept. 2024.
31
31
>
32
-
> We recommend you first review [Microsoft Entra Workload ID][workload-identity-overview] overview. This authentication method replaces Microsoft Entra pod-managed identity (preview) and is the recommended method.
32
+
> We recommend you first review [Microsoft Entra Workload ID][workload-identity-overview] overview. Entra Workload ID authentication replaces Microsoft Entra pod-managed identity (preview) and is the recommended method to enable an application running on a pod to authenticate itself against other Azure services that support it.
33
33
34
34
## Before you begin
35
35
@@ -67,7 +67,7 @@ AKS uses several managed identities for built-in services and add-ons.
67
67
| Add-on | omsagent | Used to send AKS metrics to Azure Monitor. | Monitoring Metrics Publisher role | No
68
68
| Add-on | Virtual-Node (ACIConnector) | Manages required network resources for Azure Container Instances (ACI). | Contributor role for node resource group | No
69
69
| Add-on | Cost analysis | Used to gather cost allocation data ||
70
-
| OSS project | Microsoft Entra ID-pod-identity | Enables applications to access cloud resources securely with Microsoft Entra ID. | N/A | Steps to grant permission at [Microsoft Entra Pod Identity Role Assignment configuration](./use-azure-ad-pod-identity.md).
70
+
|Workload identity| Microsoft Entra workload ID| Enables applications to access cloud resources securely with Microsoft Entra workload ID. | N/A |No |
71
71
72
72
## Enable managed identities on a new AKS cluster
73
73
@@ -103,7 +103,7 @@ To update your existing AKS cluster that's using a service principal to use a sy
103
103
az aks update -g myResourceGroup -n myManagedCluster --enable-managed-identity
104
104
```
105
105
106
-
After updating your cluster, the control plane and pods use the managed identity. kubelet continues using a service principal until you upgrade your agentpool. You can use the `az aks nodepool upgrade --resource-group myResourceGroup --cluster-name myAKSCluster --name mynodepool --node-image-only` command on your nodes to update to a managed identity. A node pool upgrade causes downtime for your AKS cluster as the nodes in the node pools are cordoned/drained and reimaged.
106
+
After updating your cluster, the control plane and pods use the managed identity. Kubelet continues using a service principal until you upgrade your agentpool. You can use the `az aks nodepool upgrade --resource-group myResourceGroup --cluster-name myAKSCluster --name mynodepool --node-image-only` command on your nodes to update to a managed identity. A node pool upgrade causes downtime for your AKS cluster as the nodes in the node pools are cordoned/drained and reimaged.
title: Azure API Management workspaces - breaking changes (June 2024) | Microsoft Docs
3
+
description: Azure API Management is updating the workspaces (preview) with breaking changes. If your service uses workspaces, you may need to update workspace configurations.
4
+
services: api-management
5
+
author: dlepow
6
+
ms.service: api-management
7
+
ms.topic: reference
8
+
ms.date: 03/07/2024
9
+
ms.author: danlep
10
+
---
11
+
12
+
# Workspaces - breaking changes (June 2024)
13
+
14
+
On 14 June 2024, as part of our development of [workspaces](../workspaces-overview.md) (preview) in Azure API Management, we're introducing several breaking changes.
15
+
16
+
These changes will have no effect on the availability of your API Management service. However, you may have to take action to continue using full workspaces functionality beyond 14 June 2024.
17
+
18
+
## Is my service affected by these changes?
19
+
20
+
Your service may be affected by these changes if you configured workspaces (preview) in your API Management instance. This feature was introduced in the **Premium**, **Standard**, and **Developer** tiers.
21
+
22
+
## Breaking changes
23
+
24
+
Review the following breaking changes to determine if you need to take action:
25
+
26
+
### Change to supported service tiers
27
+
28
+
The following service tiers will no longer support workspaces: **Standard** and **Developer**. Workspaces will be available in the **Premium** tier.
29
+
30
+
For availability in the v2 tiers, see [Azure API Management v2 tiers](../v2-service-tiers-overview.md).
31
+
32
+
### Changes to support for assigning service-level entities in workspaces
33
+
34
+
The following assignments of workspace entities to service-level entities will no longer be supported:
35
+
36
+
* Assign workspace APIs to service-level products
37
+
* Assign workspace APIs to service-level tags
38
+
* Assign workspace products to service-level tags
39
+
* Assign service-level groups to workspace products for visibility controls
40
+
41
+
> [!NOTE]
42
+
> The built-in Guests and Developer groups will continue to be available in workspaces.
43
+
44
+
### Changes to supported context objects
45
+
46
+
The following `context` objects will no longer be supported in workspace policies or in the all-APIs policy on the service level:
47
+
48
+
*`context.Api.Workspace`
49
+
*`context.Product.Workspace`
50
+
51
+
The `context.Workspace` object can be used instead.
52
+
53
+
54
+
> [!NOTE]
55
+
> You can continue to reference users from the service level in the `context` object in workspace-level policies.
56
+
57
+
## What is the deadline for the change?
58
+
59
+
The breaking changes are effective 14 June 2024. We strongly recommend that you make all required changes to the configuration of workspaces before then.
60
+
61
+
## Help and support
62
+
63
+
If you have questions, get answers from community experts in [Microsoft Q&A](https://aka.ms/apim/azureqa/change/captcha-2022). If you have a support plan and you need technical help, create a [support request](https://portal.azure.com/#view/Microsoft_Azure_Support/HelpAndSupportBlade/~/overview).
64
+
65
+
## More information
66
+
67
+
*[Workspaces overview](../workspaces-overview.md)
68
+
69
+
## Related content
70
+
71
+
See all [upcoming breaking changes and feature retirements](overview.md).
Copy file name to clipboardExpand all lines: articles/api-management/workspaces-overview.md
+13-16Lines changed: 13 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlepow
6
6
7
7
ms.service: api-management
8
8
ms.topic: conceptual
9
-
ms.date: 03/10/2023
9
+
ms.date: 01/25/2024
10
10
ms.author: danlep
11
11
ms.custom:
12
12
---
@@ -15,14 +15,14 @@ ms.custom:
15
15
16
16
In API Management, *workspaces* allow decentralized API development teams to manage and productize their own APIs, while a central API platform team maintains the API Management infrastructure. Each workspace contains APIs, products, subscriptions, and related entities that are accessible only to the workspace collaborators. Access is controlled through Azure role-based access control (RBAC).
> * Workspaces are a preview feature of API Management and subject to certain [limitations](#preview-limitations).
23
23
> * Workspaces are supported in API Management REST API version 2022-09-01-preview or later.
24
24
> * For pricing considerations, see [API Management pricing](https://azure.microsoft.com/pricing/details/api-management/).
25
-
25
+
> * See [upcoming breaking changes](./breaking-changes/workspaces-breaking-changes-june-2024.md) for workspaces.
26
26
27
27
## Example scenario overview
28
28
@@ -48,9 +48,7 @@ The following resources can be managed in the workspaces preview.
48
48
49
49
* Apply a policy for all APIs in a workspace.
50
50
51
-
* Use `context.Api.Workspace` and `context.Product.Workspace` objects in workspace-scoped policies and in the all-APIs policy on the service level.
52
-
53
-
* Describe APIs with tags from the workspace level or from the service level.
51
+
* Describe APIs with tags from the workspace level.
54
52
55
53
* Define named values, policy fragments, and schemas for request and response validation for use in workspace-scoped policies.
56
54
@@ -64,11 +62,7 @@ The following resources can be managed in the workspaces preview.
64
62
65
63
### Products and subscriptions
66
64
67
-
* Publish APIs with products. APIs in a workspace can be part of a service-level product or a workspace-level product.
68
-
69
-
* Workspace-level product - Visibility can be configured based on user membership in a workspace-level or a service-level group.
70
-
71
-
* Service-level product - Visibility can be configured only for service-level groups.
65
+
* Publish APIs with products. APIs in a workspace can only be part of a workspace-level product. Visibility can be configured based on user membership in a workspace-level or a service-level group.
72
66
73
67
* Manage access to APIs with subscriptions. Subscriptions requested to an API or product within a workspace are created in that workspace.
74
68
@@ -80,7 +74,7 @@ The following resources can be managed in the workspaces preview.
80
74
81
75
Azure RBAC is used to configure workspace collaborators' permissions to read and edit entities in the workspace. For a list of roles, see [How to use role-based access control in API Management](api-management-role-based-access-control.md).
82
76
83
-
Workspace members must be assigned both a service-scoped role and a workspace-scoped role, or granted equivalent permissions using custom roles. The service-scoped role enables referencing service-level resources from workspace-level resources. For example, publish an API from a workspace with a service-level product, assign a service-level tag to an API, or organize a user into a workspace-level group to control API and product visibility.
77
+
Workspace members must be assigned both a service-scoped role and a workspace-scoped role, or granted equivalent permissions using custom roles. The service-scoped role enables referencing certain service-level resources from workspace-level resources. For example, organize a user into a workspace-level group to control API and product visibility.
84
78
85
79
> [!NOTE]
86
80
> For easier management, set up Microsoft Entra groups to assign workspace permissions to multiple users.
@@ -95,7 +89,7 @@ Workspace members must be assigned both a service-scoped role and a workspace-sc
95
89
* API gateways, including scaling, locations, and self-hosted gateways
96
90
97
91
98
-
***Resource references** - Resources in a workspace can reference other resources in the workspace and the following resources from the service level: products, tags, and users. They can't reference resources from another workspace.
92
+
***Resource references** - Resources in a workspace can reference other resources in the workspace and users from the service level. They can't reference resources from another workspace.
99
93
100
94
For security reasons, it's not possible to reference service-level resources from workspace-level policies (for example, named values) or by resource names, such as `backend-id` in the [set-backend-service](set-backend-service-policy.md) policy.
101
95
@@ -137,10 +131,13 @@ Therefore, the following sample scenarios aren't currently supported in workspac
137
131
138
132
* Specifying API authorization server information (for example, for the developer portal)
139
133
140
-
Workspace APIs can't be published to self-hosted gateways.
134
+
* Publishing workspace APIs to self-hosted gateways
141
135
142
-
All resources in an API Management service need to have unique names, even if they are located in different workspaces.
136
+
> [!IMPORTANT]
137
+
> All resources in an API Management service need to have unique names, even if they are located in different workspaces.
138
+
>
143
139
144
-
## Next steps
140
+
## Related content
145
141
146
142
*[Create a workspace](how-to-create-workspace.md)
143
+
*[Workspaces breaking changes - June 2024](breaking-changes/workspaces-breaking-changes-june-2024.md)
0 commit comments