Skip to content

Commit

Permalink
feat: Added a known issue when using an SPN for OIDC (#1850)
Browse files Browse the repository at this point in the history
Co-authored-by: Erika Gressi <[email protected]>
  • Loading branch information
AlexanderSehr and eriqua authored Feb 11, 2025
1 parent bf825c9 commit 2683604
Showing 1 changed file with 8 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -184,6 +184,14 @@ It is highly recommended to start leveraging Option 1 below to adopt OpenID Conn

{{% expand title="➕ Option 1 [Recommended]: OIDC - Configure a federated identity credential" %}}

{{% notice style="warning" title="Using a Managed Identity for OIDC" %}}

Make sure to use a Managed Identity for OIDC as instructed below, **not** a Service Principal. Azure access token issued by Managed Identities is expected to have an expiration of 24 hours by default. With Service Principal, instead, it would be only 1 hour - which is not sufficient for many deployment pipelines.

For more information, please refer to the official [GitHub documentation](https://github.com/marketplace/actions/azure-login#login-with-openid-connect-oidc-recommended).

{{% /notice %}}

1. Create a new or leverage an existing user-assigned managed identity with at least `Contributor` & `User Access Administrator` permissions on the Management-Group/Subscription you want to test the modules in. You might find the following links useful:
- [Create a user-assigned managed identity](https://learn.microsoft.com/en-us/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities#create-a-user-assigned-managed-identity)
- [Assign an appropriate role to your user-assigned managed identity](https://learn.microsoft.com/en-us/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities#manage-access-to-user-assigned-managed-identities)
Expand Down

0 comments on commit 2683604

Please sign in to comment.