Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Please increase the number of allowed federated identity credentials that can be created for managed identity #1172

Closed
MageshSrinivasulu opened this issue Nov 7, 2023 · 2 comments
Labels
enhancement New feature or request

Comments

@MageshSrinivasulu
Copy link

Currently as per the documentation maximum of 20 federated identity credentials can be created for managed identity which is much less. Think about a scenario where 40-50 service accounts are there in the namespace for which federated identity credentials need to be created.

This restriction is literally blocking us from migrating to workload identity from the aad pod identity

image

https://learn.microsoft.com/en-us/entra/workload-id/workload-identity-federation-considerations#general-federated-identity-credential-considerations

@MageshSrinivasulu MageshSrinivasulu added the enhancement New feature or request label Nov 7, 2023
@MageshSrinivasulu
Copy link
Author

MageshSrinivasulu commented Nov 14, 2023

If others in the community are facing similar issues, please upvote here. So that the MFST product team can consider those feature enhancements https://feedback.azure.com/d365community/idea/d172a504-ced3-ed11-a81c-6045bdb23064

@aramase
Copy link
Member

aramase commented Nov 29, 2023

This is duplicate of #575

@MageshSrinivasulu thanks for opening the issue. We are working with the AAD team for potential workarounds with the 20 FIC limitation. We'll update the other issue as we make progress.

Closing as duplicate.

@aramase aramase closed this as completed Nov 29, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants