-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support Azure workload identity to access Azure resources (storage blobs, etc) #6012
Comments
OPA will simply set the key-value pairs for the We could probably make |
thanks @ashutosh-narkar for your quick response this is required by Azure only, related to Azure AD, adding the keys won't help here. the azure token is a dynamic value, |
@superff if we extend the OAuth2 Client Credentials mechanism to add a new one that takes |
those are not enough, the client_assertion is a token , it will expire in 1 hour or so. is it possible that opa can read this file |
We could have |
that will be great, thanks |
the value will |
If you'd like to contribute this feature, feel free to do so! |
I can contribute, need the reviewers to give some feedbacks on my draft PR. |
This issue has been automatically marked as inactive because it has not had any activity in the last 30 days. Although currently inactive, the issue could still be considered and actively worked on in the future. More details about the use-case this issue attempts to address, the value provided by completing it or possible solutions to resolve it would help to prioritize the issue. |
@ashutosh-narkar with the PR closed - how did you resolve this issue? |
Hey @podedra92, @superff was looking into this. The PR was closed but I don't think we merged the changes. Could be more work/investigation is still needed on it. |
This issue has been automatically marked as inactive because it has not had any activity in the last 30 days. Although currently inactive, the issue could still be considered and actively worked on in the future. More details about the use-case this issue attempts to address, the value provided by completing it or possible solutions to resolve it would help to prioritize the issue. |
What is the underlying problem you're trying to solve?
Microsoft azure is deprecating the aad pod identity,
https://github.com/Azure/aad-pod-identity#-announcement.
AAD Pod Identity has been replaced with Azure Workload Identity
We want to use the workload identity with opa to load the policies bundles from azure storage account
Describe the ideal solution
The azure workload identity supports oauth2 authentication
but it is not the same format as the client credentials described in this
example.
https://www.openpolicyagent.org/docs/latest/configuration/#oauth2-client-credentials
https://www.openpolicyagent.org/docs/latest/configuration/#example-2
it needs a few more params
like client_assertion_type and client_assertion, but the client_assertion is a dynamic token, and it is saved under a file,
Here in this doc, it listed the environment variables output by workload identity, https://azure.github.io/azure-workload-identity/docs/quick-start.html#7-deploy-workload
I am wondering could opa load this token in this file
AZURE_FEDERATED_TOKEN_FILE
dynamicallyhttps://learn.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow#third-case-access-token-request-with-a-federated-credential
sample token request
Describe a "Good Enough" solution
Additional Context
The text was updated successfully, but these errors were encountered: