aad-pod-identity | Assign Azure Active Directory Identities to Kubernetes | Azure library

 by   Azure Go Version: v1.8.16 License: MIT

kandi X-RAY | aad-pod-identity Summary

kandi X-RAY | aad-pod-identity Summary

aad-pod-identity is a Go library typically used in Cloud, Azure, Angular applications. aad-pod-identity has no bugs, it has no vulnerabilities, it has a Permissive License and it has low support. You can download it from GitHub.

IMPORTANT: As mentioned in the announcement, we are planning to replace AAD Pod Identity with Azure Workload Identity. Going forward, we will no longer add new features to this project in favor of Azure Workload Identity. However, we will continue patching critical bugs and security vulnerabilities until further notice. AAD Pod Identity enables Kubernetes applications to access cloud resources securely with Azure Active Directory. Using Kubernetes primitives, administrators configure identities and bindings to match pods. Then without any code modifications, your containerized applications can leverage any resource in the cloud that depends on AAD as an identity provider.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              aad-pod-identity has a low active ecosystem.
              It has 572 star(s) with 265 fork(s). There are 36 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              There are 3 open issues and 670 have been closed. On average issues are closed in 169 days. There are 1 open pull requests and 0 closed requests.
              It has a neutral sentiment in the developer community.
              The latest version of aad-pod-identity is v1.8.16

            kandi-Quality Quality

              aad-pod-identity has no bugs reported.

            kandi-Security Security

              aad-pod-identity has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.

            kandi-License License

              aad-pod-identity is licensed under the MIT License. This license is Permissive.
              Permissive licenses have the least restrictions, and you can use them in most projects.

            kandi-Reuse Reuse

              aad-pod-identity releases are available to install and integrate.
              Installation instructions are available. Examples and code snippets are not available.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of aad-pod-identity
            Get all kandi verified functions for this library.

            aad-pod-identity Key Features

            No Key Features are available at this moment for aad-pod-identity.

            aad-pod-identity Examples and Code Snippets

            No Code Snippets are available at this moment for aad-pod-identity.

            Community Discussions

            QUESTION

            Accessing azure sql db from AKS cluster using AAD authentication
            Asked 2021-May-03 at 17:38

            I am able to access sql server azure from my .net core application running in app service by using AAD authentication. To be able to do so it was necessary to register user assigned managed identity in sql server and it was done by following steps in this article . In addition, it was necessary to specify AzureServicesAuthConnectionString (RunAs=App;AppId=c5309486-960d-46f4-bbea-XXX) to allow applicaiton code to request authentication token from Azure token provider, more info here

            Now I am trying to migrate my application into AKS cluster. I am following instructions from https://www.cloudiqtech.com/implementing-azure-ad-pod-identity-in-aks-cluster/ to install Azure identity into cluster by using kubernetess application https://github.com/Azure/aad-pod-identity After all configuration was created, I also added AzureServicesAuthConnectionString to config map but the application fails with the following message :

            An error occurred seeding the DB.

            System.AggregateException: One or more errors occurred. (Parameters: Connection String: RunAs=App;AppId=a349660d-cbfd-45fc-a917-XXX, Resource: https://database.windows.net/, Authority: . Exception Message: Tried to get token using Managed Service Identity. Access token could not be acquired. The operation was canceled.)

            ---> Microsoft.Azure.Services.AppAuthentication.AzureServiceTokenProviderException: Parameters: Connection String: RunAs=App;AppId=a349660d-cbfd-45fc-a917-XXX, Resource: https://database.windows.net/, Authority: . Exception Message: Tried to get token using Managed Service Identity. Access token could not be acquired. The operation was canceled.

            at Microsoft.Azure.Services.AppAuthentication.AzureServiceTokenProvider.GetAuthResultAsyncImpl(String resource, String authority, Boolean forceRefresh, CancellationToken cancellationToken)

            at Microsoft.Azure.Services.AppAuthentication.AzureServiceTokenProvider.GetAccessTokenAsync(String resource, String tenantId, Boolean forceRefresh, CancellationToken cancellationToken)

            --- End of inner exception stack trace ---

            at System.Threading.Tasks.Task`1.GetResultCore(Boolean waitCompletionNotification)

            at System.Threading.Tasks.Task`1.get_Result()

            at MvcMovie.DataAccess.MovieContext..ctor(DbContextOptions`1 options)

            at MvcMovie.DataAccess.SeedData.Initialize(IServiceProvider serviceProvider)

            at MvcMovie.Program.Main(String[] args)

            ...

            ANSWER

            Answered 2021-May-03 at 17:38

            From AAD Pod Identity for Kubernetes documentation: AKS and aks-engine clusters require an identity to communicate with Azure. This identity can be either a managed identity (in the form of system-assigned identity or user-assigned identity) or a service principal. This section explains various role assignments that need to be performed before using AAD Pod Identity. Without the proper role assignments, your Azure cluster will not have the correct permission to assign and un-assign identities from the underlying virtual machines (VM) or virtual machine scale sets (VMSS).

            I was missing the following role assignemt to the cluster system assigned managed identity:"Managed Identity Operator", "Virtual Machine Contributor"

            In addition the user assigned managed identity that accesses data bases needs to be created within the same resource group that AKS cluster was created in.

            Source https://stackoverflow.com/questions/67340042

            QUESTION

            Unable to get Azure Key Vault integrated with Azure Kubernetes Service
            Asked 2021-Feb-17 at 13:42

            Stuck on getting this integration working. I'm following the documentation step-by-step.

            The following is everything I have done starting from scratch, so if it isn't listed here, I haven't tried it (I apologize in advance for the long series of commands):

            ...

            ANSWER

            Answered 2021-Feb-17 at 00:31

            Looks it is related to the default network plugin that AKS picks for you if you don't specify "Advanced" for network options: kubenet.

            This integration can be done with kubenet outlined here:

            https://azure.github.io/aad-pod-identity/docs/configure/aad_pod_identity_on_kubenet/

            If you are creating a new cluster, enable Advanced networking or add the --network-plugin azure flag and parameter.

            Source https://stackoverflow.com/questions/66191176

            QUESTION

            Accessing Azure Storage Blob from an AKS cluster
            Asked 2019-May-28 at 20:28

            A little context: I'm having to migrate a project from AWS, where I'm currently using ECS, to Azure, where I'll be using AKS since their ACS (ECS equivalent) is deprecated.

            This is a regular Django app, with its configuration variables being fetched from a server-config.json hosted on a private S3 bucket, the EC2 instance has the correct role with S3FullAccess,

            I've been looking into reproducing that same behavior but with Azure Blob Storage instead, having achieved no success whatsoever :-(.

            I tried using the Service Principal concept and adding it to the AKS Cluster with Storage Blob Data Owner roles, but that doesn't seem to work. Overall it's been quite the frustrating experience - maybe I'm just having a hard time grasping the right way to use the permissions/scopes. The fact that the AKS Cluster creates its own resource group is something unfathomable - but I've attempted attaching the policies to it as well, to no avail. I then moved onto a solution indicated by Microsoft.

            I managed to bind my AKS pods with the correct User Managed Identity through their indicated solution aad-pod-identity, but I feel like I'm missing something. I assigned Storage Blob Data Owner/Contributor to the identity, but still, when I enter the pods and try to access a Blob (using the python sdk), I get a resource not found message.

            Is what I'm trying to achieve possible at all? Or will I have to change to a solution using Azure Keyvault/something along those lines?

            ...

            ANSWER

            Answered 2019-May-28 at 20:28

            first off all, you can use AKS Engine which is more or less ACS for Kubernetes now.

            As for the access to the blob storage, you dont have to use Managed Service Identity, you can just use account name\key ( which is a bit less secure, but a lot less error prone and more examples exist ). The fact that you are getting resource not found error most likely means your auth part is fine, you just dont have access to the resource, according to this storage blob contributor should be fine if you assigned it at a proper scope. For this to work 100% just give your identity contributor access at subscription level, this way its guaranteed to work.

            I've found an example of using python with MSI (here). You should start with that (and grant your identity contributor access) and verify you can list resource groups. when that works making reading blobs working should be trivial.

            Source https://stackoverflow.com/questions/56349424

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install aad-pod-identity

            Setup the correct role assignments on Azure and install AAD Pod Identity through Helm or YAML deployment files. Get familiar with our CRDs and core components. Try our walkthrough to get a better understanding of the application workflow.

            Support

            aad-pod-identity is an open source project that is not covered by the Microsoft Azure support policy. Please search open issues here, and if your issue isn't already represented please open a new one. The project maintainers will respond to the best of their abilities.
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/Azure/aad-pod-identity.git

          • CLI

            gh repo clone Azure/aad-pod-identity

          • sshUrl

            git@github.com:Azure/aad-pod-identity.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link