Skip to content

Latest commit

 

History

History
25 lines (17 loc) · 1.35 KB

File metadata and controls

25 lines (17 loc) · 1.35 KB

Authorize pods via Pod Identity

It is generally a best practice to use Azure Active Directory integration with AKS. The suggestion is not to use credential information explicitly like passwords. A further step is to use pod identities where possible.

How it works

  1. Cluster operator first creates a service account that can be used to map identities when pods request access to services.
  2. The NMI server and MIC are deployed to relay any pod requests for access tokens to Azure AD.
  3. A developer deploys a pod with a managed identity that requests an access token through the NMI server.
  4. The token is returned to the pod and used to access an Azure SQL Server instance.

Pod Identities

Available services

Further Readings

Github repo for AAD POD Identity Auth Best Practices Using Managed Identities to Securely Access Azure Resources