-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for OIDC Authentication with Service Principal #16900
Comments
Hi @ekristen, many thanks for the detailed issue. Whilst there are a limited number of scenarios we can officially support when it comes to OIDC providers, I do think that generic support for a user-supplied ID token is something we can add. I think it's worth looking at the documentation and implementation in tandem, so to keep the conversation together I'm going to close this issue in favor of your other open issue #16901. Thanks again. |
I understand you closing this in favor of #16901. I would like to point out that supporting OIDC is actually very very simple and you are already doing it on the second part of the GitHub auth implementation when you take the JWT from the special Github service and then authenticate to Azure. It's actually GitHub that's non-standard an thus the custom implementation. For those using OIDC with Kubernetes or any number of other scenarios just supporting the pass in via token and passing that to Azure is all that is needed. Azure does the rest. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Is there an existing issue for this?
Community Note
Description
First of all, thank you to all the maintainers for their work, as an open source maintainer you deal with a lot of headache without pay, so I appreciate your efforts.
The Request
Request adding support for Kubernetes and Generic OIDC Issuer support for authentication
Background
The Service Principal Authentication with OIDC that was just merged (nice job!) unfortunately the documentation is a bit misleading and in fact it only works with GitHub Actions.
Service Principals can have federated authentication from a Generic OIDC Issuer, Kubernetes or GitHub Actions/Tokens. Both the Generic OIDC and Kubernetes are direct OIDC where you have to have a JWT from the issuer and pass that to Azure in exchange for an Azure token.
However the GitHub Token OIDC is NOT direct OIDC. It expects to run in a GitHub Action runner, receive a GitHub Token, and make a special HTTP call to a GitHub hosted endpoint that exchanges the GitHub Token for a JWT that is then passed to the Azure authentication as an OIDC federated token.
Possible Solution
New or Affected Resource(s)/Data Source(s)
azurerm
Potential Terraform Configuration
No response
References
No response
The text was updated successfully, but these errors were encountered: