You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
I feel like this is a consequence of the fundamental design of the env-injector, but I'd like to discuss the consequences.
When using the env-injector with customAuth, I have to add a aadpodidbinding label to the pod, so that the Injector can connect to Key Vault using the credentials of the pod. Consequently, this means, that later, once inside the container, i can simply connect to the Key Vault directly and get any secret:
Expected behavior
I was hoping to limit the access to Key Vault secrets in case of a malicious take-over. To me, it seems like using the env-injector that is not the case.
The text was updated successfully, but these errors were encountered:
See your point, but not really something we can control from the injector. The injecter basically gets handed some credentials to use to access azure key vault. What you are referring too is basically how MS implementation of pod identity works.
It is possible to pass the injector a specific service principal, without using pod identity, but not convenient. On this topic, MS is also adding native support for managed identities in AKS, currently in preview: https://docs.microsoft.com/en-us/azure/aks/use-managed-identity
None of this will help much in what you are aiming for.
The last thing is how authorization works in AKV - not letting you limit access to individual secrets.
This is why we typically create many different key vaults. Each with its own purpose- either for an application or dedicated to a Kubernetes cluster.
We are of course open for any suggestions you might have, that would make the env injector better. But on this topic I personally can’t see what we could do differently to improve the situation.
torresdal
changed the title
[BUG] Using env-injector with aad-pod-identity allows getting all secrets
Using env-injector with aad-pod-identity allows getting all secrets
Mar 3, 2020
Describe the bug
I feel like this is a consequence of the fundamental design of the env-injector, but I'd like to discuss the consequences.
When using the
env-injector
withcustomAuth
, I have to add aaadpodidbinding
label to the pod, so that the Injector can connect to Key Vault using the credentials of the pod. Consequently, this means, that later, once inside the container, i can simply connect to the Key Vault directly and get any secret:Maybe there is another way to configure the Injector that I'm missing? The way it currently is, I am not gaining much in terms of security.
Steps to Reproduce:
Expected behavior
I was hoping to limit the access to Key Vault secrets in case of a malicious take-over. To me, it seems like using the env-injector that is not the case.
The text was updated successfully, but these errors were encountered: