Open
Description
I am testing Azure Workload Identity , which is working as expected, but i am facing an issue i am not sure how to handle
- My nodes have a
User Assigned identity
, used by controllers like azuredisk-csi driver , external cloud controllers and so on with quite wide permissions inside the resourceGroup - When testing workload identity with an azure cli pod ( with a properly configured SA and so on )
- I can assume the right federated UA for the given SA by doing
az login --federated-token "$(cat $AZURE_FEDERATED_TOKEN_FILE)" --service-principal -u $AZURE_CLIENT_ID -t $AZURE_TENANT_ID
- I can assume the node UA Identity with very wide permissions by doing
az login --identity
- I can assume the right federated UA for the given SA by doing
Is there a best practice on how to handle this situation ?
with the now deprecated aad pod identity
all requests to the Metadata Servers where intercepted and so a pod was not able to assume the node identity ( or a role not assigned to it ) but with the current implementation of AWI there is nothing preventing this.
At the moment my only idea is to
- Force all controller pods to the master nodes
- Reduce scope of UA Identity on worker nodes to the bare minimum (registry access only i think )
I want to understand if this is how the setup is supposed to look like or if i am missing something obvious :)
thanks