Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Isolate identities for different tenants #1556

Open
1 task done
binbin-li opened this issue Jun 7, 2024 · 3 comments
Open
1 task done

Isolate identities for different tenants #1556

binbin-li opened this issue Jun 7, 2024 · 3 comments
Labels
enhancement New feature or request
Milestone

Comments

@binbin-li
Copy link
Collaborator

binbin-li commented Jun 7, 2024

What would you like to be added?

Currently Ratify is integrated with Azure workload identity by using service account to federate identity credentials from managed identity. However, Ratify only has one service account created and it belongs to a specific namespace, gatekeeper-system in most cases. Therefore, it's not natively working for multi-tenancy scenario. The same service account is shared by all namespaces.

In the meantime, we found it's possible to federate multiple identities with a single service account, so Ratify's service account could build federation with multiple identities. The remaining work is to figure out how to isolate access to different identities for each tenant while sharing the same service account.

Anything else you would like to add?

No response

Are you willing to submit PRs to contribute to this feature?

  • Yes, I am willing to implement it.
@binbin-li binbin-li added enhancement New feature or request triage Needs investigation labels Jun 7, 2024
@akashsinghal
Copy link
Collaborator

@binbin-li Is there a limit to the # of managed identities you can federate to a single Service Account? I thought there was a limitation on Azure MI end too

@akashsinghal
Copy link
Collaborator

akashsinghal commented Jun 7, 2024

@binbin-li Is there a limit to the # of managed identities you can federate to a single Service Account? I thought there was a limitation on Azure MI end too

Actually, it seems there's a limit of 20 federated credentials per MI but I don't see limit on the number of MI per service
https://learn.microsoft.com/en-us/azure/aks/workload-identity-overview?tabs=dotnet#limitationsaccount.

@susanshi susanshi added this to the v1.3.0 milestone Jun 18, 2024
@susanshi
Copy link
Collaborator

Lower priority for Ratify 1.3

@susanshi susanshi removed the triage Needs investigation label Jun 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants