Connection to storage account with storage account keys disabled doesn't work with workload identity (kerberos auth support) #1737
Open
Description
What happened: We mapped workload identity to UAMI with RBAC role (SMB Elevated Contributor) on desired storage account scope, however it raises permission denied on mount attempt when storage account keys are disabled on this storage account. When we enable storage account keys it starts to work again.
What you expected to happen: CSI Driver should use RBAC role instead of downloading storage keys
How to reproduce it: Setup CSI connection to storage account with usage of workload identity -> disable storage keys on desired accounts -> try to run the application
Anything else we need to know?:
Environment:
- CSI Driver version: 1.30
- Kubernetes version (use
kubectl version
): 1.27.7 - OS (e.g. from /etc/os-release): Ubuntu Linux
- Kernel (e.g.
uname -a
): managed by MS - Install tools:
- Others:
Metadata
Assignees
Labels
No labels