New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support Authenticating using a Service Principal with Open ID Connect #737
Comments
any updates when this will be added? |
Hello? 😃 |
We're having high demand for this as well! With workload identity federation now being the default setup for service connection this requires us to maintain legacy configurations. |
@alexott any update on this issue? |
Please! can we get an update on this? |
Hi All, Meanwhile this is how I am working around for the both For azurerm,
For azure-databricks,
|
Hi there,
Currently the supported authentication types are pat, basic, azure-client-secret, azure-msi, azure-cli, google-credentials, and google-id for databricks provider.
Proposal
With the introduction of Workload Identity federation in CI/CD pipelines for Azure Resource Manager, need azure-oidc support as well to authenticate azure databricks provider. This support is already available for AzureRM provider. When we combine both azurerm and azure-databricks providers for deployment in single CI/CD pipeline, it is hard to maintain different authentication types for each provider.
References
https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/guides/service_principal_oidc
The text was updated successfully, but these errors were encountered: