-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to enable Workload Identity in EA #838
Comments
Another question is we are using " tokenCredential = new ManagedIdentityCredential();" [Azure.Identity 1.5.0]in our code, By checking your example code, "DefaultAzureCredential" will use the environment variables injected by the Azure Workload Identity, I assume ManagedIdentityCredential will act the same as DefaultAzureCredential, so we dont need change our code in this case? https://learn.microsoft.com/en-us/dotnet/api/azure.identity.defaultazurecredential?view=azure-dotnet |
@aramase Do you have any insight on how to bypass the limitation on East Asia, it is a blocker for us as well to migrate pod identity to workload identity. |
@peqi-ms The minimum required SDK versions are documented here. |
The only possible work-around is to use identity from a different region. |
Closing this issue with #838 (comment) and #838 (comment). Feel free to reopen if you have any questions. |
Hi @aramase, looks like this issue was closed without a solution to the initial question regarding to the EastAsia region? This is a blocker for us moving off of AADpod identity to Workload Identity. Is there a solution to this blocker that can be found somewhere? If not what is the workaround for EastAsia? |
@RichardChen820 Curious if you were able to find a workaround for this east asia Issue? Thanks. |
Is your feature request related to a problem? Please describe.
Hi, we are hosting our services in AKS in multiple regions(e.g. eus, wus, scus, ea).
Currently, we are using aad-pod-identity talking to Azure KeyVault and generate/inject tokencredential into our services on AKS clusters.
Aad-pod-identity will be deprecated, so we are onboarding to workload identity.
Both our MSI(user assigned managed identity), KV, and services are allocated per region, and one of our regions is East Asia.
According to Doc here: "e2e-test-images/busybox", we can't generate federated credential between "EastAsia AKS oidc issuer" and "EastAsia user-assigned-managed-identity". Looks like we can generate federated credential by a dedicated identity generated by other region, but this going to be a big change and not compliance. Is there a workaround for this?
Describe the solution you'd like
Describe alternatives you've considered
Additional context
The text was updated successfully, but these errors were encountered: