-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refactor Azure authentication support to use azidentity
#1630
Comments
Required for #1300 |
New packages are available for certificates and keys from AKV as well: |
This work for |
I did some investigation, post my findings:
|
@shahramk64 just curious if you've made any progress of this just yet. I'm working on a related issue #1751 and will likely update the certs packages. |
@duffney I haven't started working on this one yet. I'll update you once this one is started. |
What would you like to be added?
Ratify's Azure Key Vault and ORAS workload identity provider utilize
azure/go-autorest
library for fetching the AAD token. This library is now deprecated as of March of 2023. Ratify should transition to useazidentity
go package which the ORAS Managed Identity auth provider already uses.Furthermore, Ratify should take the time to support a more generic AAD auth token fetch functionality that can accept a configurable
DefaultAzureCredential
which can support environment, workload identity, managed identity, and interactive authentication. Along with this, the AKV provider and ORAS auth provider should provide more generic azure support to handle mutiple flows of authentication, not just Workload identity. This is critical for CLI scenarios.Anything else you would like to add?
No response
Are you willing to submit PRs to contribute to this feature?
The text was updated successfully, but these errors were encountered: