Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add External Identity Providers support in AKS #2861

Open
miwithro opened this issue Mar 22, 2022 · 75 comments
Open

Add External Identity Providers support in AKS #2861

miwithro opened this issue Mar 22, 2022 · 75 comments
Assignees
Labels
feature-request Requested Features security

Comments

@miwithro
Copy link
Contributor

miwithro commented Mar 22, 2022

Allow external identity providers to be used for authentication to AKS clusters. This feature takes a dependency on structured authentication feature upstream (https://kubernetes.io/blog/2024/04/25/structured-authentication-moves-to-beta/).

@mjsabby
Copy link

mjsabby commented Mar 23, 2022

What is the ETA for this in a public AKS release? I'm assuming this feature is required to implement equivalent functionality that we had with aad pod identity?

@miwithro
Copy link
Contributor Author

Workload Identity is using OIDC Issuer which we have already published. This is adding additional OIDC Federation capabilities. We don't have an ETA yet, as we are still doing planning.

@ghost
Copy link

ghost commented Mar 23, 2022

@Azure/aks-pm issue needs labels

@CocoWang-wql CocoWang-wql changed the title Add OIDC Federation support in AKS Add External Identity Providers support in AKS Mar 24, 2022
@CocoWang-wql
Copy link
Contributor

The OIDC federation feature would be named "External Identity Providers" in AKS cluster.

@ghost
Copy link

ghost commented Mar 30, 2022

@Azure/aks-pm issue needs labels

@NeelavaChatterjee
Copy link

Will this feature be available within 3 or 6 months?

@CocoWang-wql
Copy link
Contributor

This feature is in plan and checking internally about the ETA. Will update soon.

@CocoWang-wql
Copy link
Contributor

The tentative date for public preview is Oct.

@ghost
Copy link

ghost commented May 27, 2022

Action required from @Azure/aks-pm

@ghost ghost added the Needs Attention 👋 Issues needs attention/assignee/owner label May 27, 2022
@CocoWang-wql CocoWang-wql removed action-required Needs Attention 👋 Issues needs attention/assignee/owner labels May 28, 2022
@ghost ghost added the action-required label Jun 22, 2022
@ghost
Copy link

ghost commented Jun 27, 2022

Action required from @Azure/aks-pm

@ghost ghost added the Needs Attention 👋 Issues needs attention/assignee/owner label Jun 27, 2022
@ghost
Copy link

ghost commented Jul 12, 2022

Issue needing attention of @Azure/aks-leads

1 similar comment
@ghost
Copy link

ghost commented Jul 27, 2022

Issue needing attention of @Azure/aks-leads

@miwithro miwithro removed action-required Needs Attention 👋 Issues needs attention/assignee/owner labels Jul 27, 2022
@ghost ghost added the action-required label Aug 22, 2022
Copy link
Contributor

Action required from @Azure/aks-pm

@CocoWang-wql
Copy link
Contributor

We start the design. And we will share the progress here.

@maheshrajrp
Copy link

another month passed guys, any updates ?

@sspreitzer
Copy link

I just returned from a physical meeting at Microsoft in Zurich, Switzerland with Brian Redmond (@chzbrgr71). He is one of the product managers for AKS. We discussed this issue and Brian assured me that holding Microsoft accountable for implementing this feature is good and Microsoft will take a closer look on this topic, and will definitely follow-up.

I just wanted this community to know and document today's event.

@palakchheda
Copy link

hi, any progress/update on this? Seems like upstream kubernetes now support multiple OIDC identity provider configurations.

@harjain99
Copy link

Hi! Just checking in here to see if there any updates on this issue.

@qudongfang
Copy link

Any updates?

@qudongfang
Copy link

Currently planned for AKS 1.30 Enable OIDC Federation support to enable multi-cloud or alternative identity solutions in AKS.

AKS 1.30 was released in July 2024, and this feature is still in the backlog https://github.com/orgs/Azure/projects/685/views/1

https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar

@charleswool charleswool self-assigned this Sep 14, 2024
@palakchheda
Copy link

Is there an ETA or any workaround on this?

@shashankbarsin
Copy link
Contributor

This feature has a dependency on an upstream feature - structured authentication, which is in beta status from 1.30 k8s upstream (not AKS). We are currently working on the AKS integration for the above and have a tentative ETA of June 2025 for public preview

@sspreitzer
Copy link

@shashankbarsin as good as it sounds, there is still fear, uncertainty and doubt on the user and community side.

I don't think that you are trying to implement an open interoperable interface such as the authentication configuration but merely politicaly being forced to technicaly implement a "Microsoft Entra ID"-only vendor lock-in.

Why do I think so? Because this feature is too easy to implement and Microsoft has not implemented it for years.

If you want to do something to build trust with your user base and the community, just implement this feature asap and stop waiting.

@nweisenauer-sap
Copy link

We would also love to see this happen.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature-request Requested Features security
Development

No branches or pull requests