You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/book/src/topics/identities.md
+61Lines changed: 61 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -182,6 +182,67 @@ spec:
182
182
183
183
When using a user-assigned managed identity to create the workload cluster, a VM identity should also be assigned to each control plane machine in the workload cluster for Azure Cloud Provider to use. See [here](../self-managed/vm-identity.md#managed-identities) for more information.
184
184
185
+
## User-Assigned Identity Credentials
186
+
187
+
<aside class="note">
188
+
189
+
<h1> Note </h1>
190
+
191
+
This option is only available for 1st party Microsoft applications who have access to the msi data-plane.
192
+
193
+
</aside>
194
+
195
+
#### General
196
+
This authentication type is similar to user assigned managed identity authentication combined with client certificate
197
+
authentication. As a 1st party Microsoft application, one has access to pull a user assigned managed identity's backing
198
+
certificate information from the MSI data plane. Using this data, a user can authenticate to Azure Cloud.
199
+
200
+
#### Prerequisites
201
+
A JSON file with information from the user assigned managed identity. It should be in this format:
Note, the client secret should be a base64 encoded certificate.
220
+
221
+
The steps to get this information from the MSI data plane are as follows:
222
+
1. Make an unauthenticated GET or POST (no Authorization request headers) on the x-ms-identity-url received from ARM to get the token authority and, on older api versions, resource.
223
+
2. Get an Access Token from Azure AD using your Resource Provider applicationId and Certificate. The applicationId should match the one you added to your manifest. The response should give you an access token.
224
+
3. Perform a GET or POST to MSI on the same URL from earlier to get the Credentials using this bearer token.
225
+
226
+
#### Creating the AzureClusterIdentity
227
+
228
+
The corresponding values should be used to create an `AzureClusterIdentity` resource:
0 commit comments