Workload Identity
Use Workload Identity to access Keyvault.
Following order of access modes is recommended for Secret Store CSI driver AKV provider:
| Access Option | Comment |
|---|---|
| Identity Binding [RECOMMENDED for AKS] | Uses AKS Identity Binding to access Key Vault. Only requires a single FIC on the managed identity regardless of how many clusters or workloads use it, eliminating workload identity’s 20 FIC-per-identity limit. AKS only. |
| Workload Identity [RECOMMENDED] | Access Key Vault using Workload Identity Federation. Works on any Kubernetes cluster with an OIDC issuer. |
| Pod Identity [DEPRECATED] | AAD Pod Identity has been DEPRECATED. This provides a way to get access to Azure resources (AKV in this case) using the managed identity bound to the Pod. |
| Managed Identities (System-assigned and User-assigned) | Managed identities eliminate the need for developers to manage credentials. Managed identities provide an identity for applications to use when connecting to Azure Keyvault. |
| Service Principal | This is the last option to consider while connecting to AKV as access credentials need to be created as Kubernetes Secret and stored in plain text in etcd. |
Use Workload Identity to access Keyvault.
Use a System-assigned Managed Identity to access Keyvault.
Use a User-assigned Managed Identity to access Keyvault.
Use a Service Principal to access Keyvault.
Use Pod Identity to access Keyvault.
Use Identity Binding to access Key Vault on AKS.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.