You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently Ratify is integrated with Azure workload identity by using service account to federate identity credentials from managed identity. However, Ratify only has one service account created and it belongs to a specific namespace, gatekeeper-system in most cases. Therefore, it's not natively working for multi-tenancy scenario. The same service account is shared by all namespaces.
In the meantime, we found it's possible to federate multiple identities with a single service account, so Ratify's service account could build federation with multiple identities. The remaining work is to figure out how to isolate access to different identities for each tenant while sharing the same service account.
Anything else you would like to add?
No response
Are you willing to submit PRs to contribute to this feature?
Yes, I am willing to implement it.
The text was updated successfully, but these errors were encountered:
@binbin-li Is there a limit to the # of managed identities you can federate to a single Service Account? I thought there was a limitation on Azure MI end too
@binbin-li Is there a limit to the # of managed identities you can federate to a single Service Account? I thought there was a limitation on Azure MI end too
What would you like to be added?
Currently Ratify is integrated with Azure workload identity by using service account to federate identity credentials from managed identity. However, Ratify only has one service account created and it belongs to a specific namespace, gatekeeper-system in most cases. Therefore, it's not natively working for multi-tenancy scenario. The same service account is shared by all namespaces.
In the meantime, we found it's possible to federate multiple identities with a single service account, so Ratify's service account could build federation with multiple identities. The remaining work is to figure out how to isolate access to different identities for each tenant while sharing the same service account.
Anything else you would like to add?
No response
Are you willing to submit PRs to contribute to this feature?
The text was updated successfully, but these errors were encountered: