@@ -97,21 +97,24 @@ main() {
9797 --identity-name " ${user_assigned_identity_name} " \
9898 --resource-group " ${CLUSTER_NAME} " \
9999 --issuer " ${AKS_CLUSTER_OIDC_ISSUER_URL} " \
100- --subject " system:serviceaccount:default:default" > /dev/null
100+ --subject " system:serviceaccount:default:default" \
101+ --audiences api://AzureADTokenExchange > /dev/null
101102
102103 echo " Creating federated identity credential for test-ns:default"
103104 az identity federated-credential create --name " kubernetes-federated-credential-test-ns" \
104105 --identity-name " ${user_assigned_identity_name} " \
105106 --resource-group " ${CLUSTER_NAME} " \
106107 --issuer " ${AKS_CLUSTER_OIDC_ISSUER_URL} " \
107- --subject " system:serviceaccount:test-ns:default" > /dev/null
108+ --subject " system:serviceaccount:test-ns:default" \
109+ --audiences api://AzureADTokenExchange > /dev/null
108110
109111 echo " Creating federated identity credential for negative-test-ns:default"
110112 az identity federated-credential create --name " kubernetes-federated-credential-negative-test-ns" \
111113 --identity-name " ${user_assigned_identity_name} " \
112114 --resource-group " ${CLUSTER_NAME} " \
113115 --issuer " ${AKS_CLUSTER_OIDC_ISSUER_URL} " \
114- --subject " system:serviceaccount:negative-test-ns:default" > /dev/null
116+ --subject " system:serviceaccount:negative-test-ns:default" \
117+ --audiences api://AzureADTokenExchange > /dev/null
115118
116119 # Assigning the managed identity the necessary permissions to access the keyvault
117120 echo " Assigning managed identity permissions to get secrets from keyvault"
0 commit comments