Enable AAD OIDC Signin with Federated Credential #18582
Unanswered
manish222agr
asked this question in
Q&A
Replies: 3 comments
-
Has anyone been able to solve this? I'm facing the same error. What information is needed to understand the issue? |
Beta Was this translation helpful? Give feedback.
0 replies
-
Same issue here |
Beta Was this translation helpful? Give feedback.
0 replies
-
Hi @manish222agr, hope you figured it out by now, but for anyone else looking for this:
my OIDC Config on the helm Chart looks like this: oidc.config: |
name: Azure # MANUALLY CHANGED FROM 'AzureAD'
issuer: https://login.microsoftonline.com/<tenant-id>/v2.0
clientID: <application (client) id>
azure:
useWorkloadIdentity: true
requestedIDTokenClaims:
groups:
essential: true
value: "SecurityGroup"
requestedScopes:
- openid
- profile
- email server:
serviceAccount:
# -- Create server service account
create: true
# -- Server service account name
name: argocd-server
# -- Annotations applied to created service account
annotations:
azure.workload.identity/client-id: "a123-b123-c123"
BUT podLabels:
azure.workload.identity/use: "true" credit @rooftop90 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I want to implement the argocd portal signin using OIDC. I created an AAD App as er guidelines in https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/microsoft/#entra-id-app-registration-auth-using-oidc.
I want to use the federated credentials, but cannot see any guidelines on it.
I tried to not create secret, but I am getting this error when I try to signin.
failed to get token: oauth2: "invalid_client" "AADSTS7000218: The request body must contain the following parameter: 'client_assertion' or 'client_secret'.
Please suggest steps on how an I use federated credentials.
Beta Was this translation helpful? Give feedback.
All reactions