-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Maximum of 20 federated identity credentials per Azure AD Application/Managed identity #575
Comments
This document appears to imply that an AKS cluster can only have 20 federated identities per AKS cluster, is that correct? https://learn.microsoft.com/en-us/azure/aks/workload-identity-overview#limitations Or, based on the document you linked above can we have as many managed identities as we like federated into AKS, but each of them can only have 20 federated credentials attached? Thanks |
It's 20 federated credentials per Azure AD App/managed identity. |
Great, thank you! |
Hi @aramase We have the following question about this limitation: |
@pockyhe If you need to use the identity with more than 20 federated identity credentials, it is not possible because of this limitation. You'll need to create another identity. In the future, this could be supported with wildcards in federated identity credential. Could you add your scenario and details to this issue. This is a growing list of set up and requirements, that the AAD team is looking at as part of supporting wildcards. cc @udayxhegde |
Hi, the wildcard feature is delayed for 2 years already, can you please increase the limit to 200? |
Please increase this to 200. I do not really understand the reason of this limitation |
Is there an update on whether this limit will be increased? 20 seems awfully low. |
xref: https://learn.microsoft.com/en-us/graph/api/resources/federatedidentitycredentials-overview?view=graph-rest-1.0#design-considerations
The text was updated successfully, but these errors were encountered: