[Identity] Enable identity binding mode for WorkloadIdentityCredential in AKS #53436
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixes https://github.com/Azure/azure-sdk-for-net-pr/issues/2050
This PR adds opt-in Kubernetes token proxy support to
WorkloadIdentityCredentialto work around Entra ID's limit on federated identity credentials (FICs) per managed identity. When enabled, the credential redirects all token requests to an AKS-provided proxy that handles the FIC exchange centrally.Changes
New API
AzureKubernetesTokenProxyproperty toWorkloadIdentityCredentialOptions(opt-in, default:false)Environment Variables
When
AzureKubernetesTokenProxy = true, the credential reads:AZURE_KUBERNETES_TOKEN_PROXYAZURE_KUBERNETES_CA_FILEAZURE_KUBERNETES_CA_DATAAZURE_KUBERNETES_SNI_NAMEKey Behaviors
AzureKubernetesTokenProxy = trueInvalidOperationExceptionat constructionCA_FILEfor changes and updates TLS configurationImplementation
Uses
DelegatingHandlerto intercept HTTP requests and redirect them to the proxy endpoint while preserving paths and query parameters. Implements custom certificate handling for netstandard2.0 compatibility.Testing
Example