Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support Authenticating using a Service Principal with Open ID Connect #737

Open
KarthicPortal opened this issue Dec 11, 2023 · 6 comments
Open

Comments

@KarthicPortal
Copy link

Hi there,

Currently the supported authentication types are pat, basic, azure-client-secret, azure-msi, azure-cli, google-credentials, and google-id for databricks provider.

Proposal
With the introduction of Workload Identity federation in CI/CD pipelines for Azure Resource Manager, need azure-oidc support as well to authenticate azure databricks provider. This support is already available for AzureRM provider. When we combine both azurerm and azure-databricks providers for deployment in single CI/CD pipeline, it is hard to maintain different authentication types for each provider.

References
https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/guides/service_principal_oidc

@tmh-msg
Copy link

tmh-msg commented Jan 9, 2024

any updates when this will be added?

@juicybaba
Copy link

Hello? 😃

@davidzenisu
Copy link

davidzenisu commented Apr 4, 2024

We're having high demand for this as well! With workload identity federation now being the default setup for service connection this requires us to maintain legacy configurations.

@ganesh-sahastrabuddhe
Copy link

@alexott any update on this issue?

@Chambras
Copy link

Please! can we get an update on this?

@KarthicPortal
Copy link
Author

Hi All,

Meanwhile this is how I am working around for the both azurerm and azure-databricks providers to authenticate in single terraform state file (maybe it helps someone):

For azurerm,

   ARM_USE_OIDC=true
   ARM_CLIENT_ID=xxxx
   ARM_SUBSCRIPTION_ID=xxx
   ARM_TENANT_ID=xxx

For azure-databricks,

   DATABRICKS_AUTH_TYPE="pat"
   DATABRICKS_TOKEN=$(az account get-access-token --resource 2ff814a6-3304-4ab8-85cb-cd0e6f879c1d --query "accessToken" -o tsv)
   DATABRICKS_HOST=xxx

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants