How to use external identity providers to authenticate to Azure

Rahul Katariya 20 Reputation points
2023-05-26T05:29:54.5733333+00:00

Hi,

How to use external identity providers to authenticate to Azure kubernetes cluster..

For GKE cluster I follow link, https://cloud.google.com/kubernetes-engine/docs/how-to/oidc .. Its easy.. creating Clientconfig with IssuerURI as URL of external OIDC povider.

For EKS, Cluster I follow link, https://docs.aws.amazon.com/eks/latest/userguide/authenticate-oidc-identity-provider.html .. Its easier by creating ClusterConfig and associating it.

But for Azure, I have not got any easy way to configure it.

Few articles suggest, federated approach.. few article suggest create b2c tenant and workflows. I am bit confused here.

Is there any easy way to associate external identity provide with Azure kubernetes cluster?

Thanks,

Rahul

Azure Kubernetes Service (AKS)
Azure Kubernetes Service (AKS)
An Azure service that provides serverless Kubernetes, an integrated continuous integration and continuous delivery experience, and enterprise-grade security and governance.
1,852 questions
{count} votes

Accepted answer
  1. KarishmaTiwari-MSFT 18,352 Reputation points Microsoft Employee
    2023-05-26T17:31:09.0466667+00:00

    @Rahul Katariya Thanks for posting your query on Microsoft Q&A.

    You can use Azure Active Directory (Azure AD) to authenticate users to your AKS cluster using OpenID Connect (OIDC). I think the flow should look like this - To configure OIDC authentication, you need to create an Azure AD application and configure it to use your external identity provider as an authentication source. Then, configure the AKS cluster to use the Azure AD application for OIDC authentication.

    See Azure AD workload identity. This authentication method integrates with the Kubernetes native capabilities to federate with any external identity providers on behalf of the application.

    0 comments No comments

0 additional answers

Sort by: Most helpful