@@ -97,21 +97,24 @@ main() {
97
97
--identity-name " ${user_assigned_identity_name} " \
98
98
--resource-group " ${CLUSTER_NAME} " \
99
99
--issuer " ${AKS_CLUSTER_OIDC_ISSUER_URL} " \
100
- --subject " system:serviceaccount:default:default" > /dev/null
100
+ --subject " system:serviceaccount:default:default" \
101
+ --audiences api://AzureADTokenExchange > /dev/null
101
102
102
103
echo " Creating federated identity credential for test-ns:default"
103
104
az identity federated-credential create --name " kubernetes-federated-credential-test-ns" \
104
105
--identity-name " ${user_assigned_identity_name} " \
105
106
--resource-group " ${CLUSTER_NAME} " \
106
107
--issuer " ${AKS_CLUSTER_OIDC_ISSUER_URL} " \
107
- --subject " system:serviceaccount:test-ns:default" > /dev/null
108
+ --subject " system:serviceaccount:test-ns:default" \
109
+ --audiences api://AzureADTokenExchange > /dev/null
108
110
109
111
echo " Creating federated identity credential for negative-test-ns:default"
110
112
az identity federated-credential create --name " kubernetes-federated-credential-negative-test-ns" \
111
113
--identity-name " ${user_assigned_identity_name} " \
112
114
--resource-group " ${CLUSTER_NAME} " \
113
115
--issuer " ${AKS_CLUSTER_OIDC_ISSUER_URL} " \
114
- --subject " system:serviceaccount:negative-test-ns:default" > /dev/null
116
+ --subject " system:serviceaccount:negative-test-ns:default" \
117
+ --audiences api://AzureADTokenExchange > /dev/null
115
118
116
119
# Assigning the managed identity the necessary permissions to access the keyvault
117
120
echo " Assigning managed identity permissions to get secrets from keyvault"
0 commit comments