Skip to content

Commit

Permalink
Expanded the documentation to be clear on that federated credentials …
Browse files Browse the repository at this point in the history
…are required (kedacore#1069)
  • Loading branch information
ilya-scale authored Mar 6, 2023
1 parent 14b8677 commit 4ca9d7c
Showing 1 changed file with 3 additions and 1 deletion.
4 changes: 3 additions & 1 deletion content/docs/2.10/concepts/authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -313,7 +313,9 @@ following flags -
2. `--set podIdentity.azureWorkload.clientId={azure-ad-client-id}`
3. `--set podIdentity.azureWorkload.tenantId={azure-ad-tenant-id}`

You can override the identity that was assigned to KEDA during installation, by specifying an `identityId` parameter under the `podIdentity` field. This allows end-users to use different identities to access various resources which is more secure than using a single identity that has access to multiple resources.
Setting `podIdentity.azureWorkload.enabled` to `true` is required for workload identity authentication to work. For KEDA to get access to the provided client id federated credential has to be configured on the target Managed Identity / Azure AD application. Refer to these [docs](https://azure.github.io/azure-workload-identity/docs/topics/federated-identity-credential.html). Federated credential should use this subject (if KEDA is installed in `keda` namespace): `system:serviceaccount:keda:keda-operator`.

You can override the identity that was assigned to KEDA during installation, by specifying an `identityId` parameter under the `podIdentity` field. This allows end-users to use different identities to access various resources which is more secure than using a single identity that has access to multiple resources. In the case of override federated credentials should be configured for each of the used identities.

#### EKS Pod Identity Webhook for AWS

Expand Down

0 comments on commit 4ca9d7c

Please sign in to comment.