Allow multi-tenant environments to authenticate with different Managed Identities through AAD Pod Identity #3167
Labels
capz
Required for CAPZ ASO adoption
high-priority
Issues we intend to prioritize (security, outage, blocking bug)
Describe the current behavior
Currently, ASO allows authenticating to Azure with a user-assigned managed identity + AAD Pod Identity, but only by referencing the managed identity's client ID in the global
aso-controller-settings
Secret as documented here: https://azure.github.io/azure-service-operator/guide/authentication/credential-format/#deprecated-managed-identity-aad-pod-identity.When trying to configure the same credentials in a per-resource Secret that looks like:
I see an error that seems to indicate ASO is trying to authenticate with Workload Identity:
Describe the improvement
ASO should allow resources to set a
credential-from
that refers to a Secret whoseAZURE_CLIENT_ID
refers to a managed identity.Additional context
CAPZ supports this use case as documented here: https://capz.sigs.k8s.io/topics/multitenancy.html#user-assigned-managed-identity. We'd like to be able to support this with our ASO integration as well to help smooth the transition for users to Workload ID.
The text was updated successfully, but these errors were encountered: