Skip to content

Commit

Permalink
fix: Identity segregation is not supported in KEDA v2.7 (kedacore#933)
Browse files Browse the repository at this point in the history
Relates to kedacore/keda#2656

Signed-off-by: Tom Kerkhove <[email protected]>

Signed-off-by: Tom Kerkhove <[email protected]>
  • Loading branch information
tomkerkhove authored Sep 13, 2022
1 parent 3f4827b commit f590ff1
Showing 1 changed file with 0 additions and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,6 @@ You can tell KEDA to use Azure AD Pod Identity via `podIdentity.provider`.
```yaml
podIdentity:
provider: azure # Optional. Default: none
identityId: <identity-id> # Optional. Default: Identity linked with the label set when installing KEDA.
```
Azure AD Pod Identity will give access to containers with a defined label for `aadpodidbinding`. You can set this label on the KEDA operator deployment. This can be done for you during deployment with Helm with `--set podIdentity.activeDirectory.identity={your-label-name}`.

You can override the identity that was assigned to KEDA during installation, by specifying an `identityId` parameter under the `podIdentity` field. This allows end-users to use different identities to access various resources which is more secure than using a single identity that has access to multiple resources.

0 comments on commit f590ff1

Please sign in to comment.