-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Using Azure managed identity for authenticating to Azure Storage and Azure Tables #201
Comments
This seems easily implemented. In Need a fitting API to do it though. Maybe set the I'm open to ideas, preferably ones that don't change current behaviour. |
Instead of just |
Thanks for considering this! I think DefaultAzureCredential would be appropriate. The reason I say so is that the AWS SDK also does something very similar, see https://docs.aws.amazon.com/sdk-for-net/v3/developer-guide/creds-assign.html; it automatically iterates through credentials, set profiles, env vars, mounted tokens in a container, and finally instance metadata. I'm fairly used to expecting a tool that uses a public cloud SDK to go "hands-off" and let the SDK do its own thing when figuring out authenticating to that cloud, so that doesn't bother me. I agree that it makes sense in this scenario for "AccessKey" and "ConnectionString" being empty leading to falling back on DefaultAzureCredential (for Azure), and initializing S3 client without credentials (for AWS). |
Is your feature request related to a problem? Please describe.
I'm running BaGetter on an Azure VM with a managed identity. I'd like to use the VM's managed identity to authenticate to Azure Blob Storage and Azure Table Storage, instead of a connection string with a hardcoded key or SAS token.
Describe the solution you'd like
I'd like BaGetter to automatically try to use DefaultAzureCredential if a ConnectionString isn't set. (I'd also need to be able to set the storage account name and table/container names separately from the connection string.)
Describe alternatives you've considered
ConnectionString works, I just need to handle securing and rotating the SAS token, which is work I wouldn't have to do if I could use the VM's managed identity.
The text was updated successfully, but these errors were encountered: