Identity Access Modes

The Azure Key Vault Provider offers five modes for accessing a Key Vault instance

Best Practices

Following order of access modes is recommended for Secret Store CSI driver AKV provider:

Access OptionComment
Identity Binding [RECOMMENDED for AKS]Uses AKS Identity Binding to access Key Vault. Only requires a single FIC on the managed identity regardless of how many clusters or workloads use it, eliminating workload identity’s 20 FIC-per-identity limit. AKS only.
Workload Identity [RECOMMENDED]Access Key Vault using Workload Identity Federation. Works on any Kubernetes cluster with an OIDC issuer.
Pod Identity [DEPRECATED]AAD Pod Identity has been DEPRECATED.
This provides a way to get access to Azure resources (AKV in this case) using the managed identity bound to the Pod.
Managed Identities (System-assigned and User-assigned)Managed identities eliminate the need for developers to manage credentials. Managed identities provide an identity for applications to use when connecting to Azure Keyvault.
Service PrincipalThis is the last option to consider while connecting to AKV as access credentials need to be created as Kubernetes Secret and stored in plain text in etcd.

Workload Identity

Use Workload Identity to access Keyvault.

System-assigned Managed Identity

Use a System-assigned Managed Identity to access Keyvault.

User-assigned Managed Identity

Use a User-assigned Managed Identity to access Keyvault.

Service Principal

Use a Service Principal to access Keyvault.

Pod Identity

Use Pod Identity to access Keyvault.

Identity Binding

Use Identity Binding to access Key Vault on AKS.