Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is it valid to omit "azure.workload.identity/client-id" when using system-assigned managed identities? #1353

Open
ofirc opened this issue May 17, 2024 · 0 comments

Comments

@ofirc
Copy link

ofirc commented May 17, 2024

When using the Azure Workload Identity, what happens when you don't use the client-id annotation?

I created a Pod with a label azure.workload.identity/use: true but didn't use annotation azure.workload.identity/client-id and I didn't see the Azure env vars injected onto the Pod, as expected.

I looked at the docs (link1, link2) but they do not specify what is the expected behavior and I'm confused.

The omission of client-id is on purpose as I want to KISS and I'm using a system-assigned managed identity.

What is the expected behavior here? Is it (Azure Workload Identity) only supported with a user-assigned managed identity?

Also, what credentials providers CLI or Golang packages can be built on top of this?
I am assuming that there are credentials providers that either (1) Use the Azure SDK or (2) Can rely on the injected env vars and the projected service account token, and use that to access ACRs (or contact Azure AAD to obtain temporary tokens for the ACRs).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant