You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+61-6
Original file line number
Diff line number
Diff line change
@@ -150,14 +150,14 @@ of your cluster's resources before continuing._
150
150
151
151
## Set permissions for Velero
152
152
153
-
There are several ways Velero can authenticate to Azure: (1) by using a Velero-specific [service principal][20]; (2) by using [Azure AD Workload Identity][23]; or (3) by using a storage account access key.
153
+
There are several ways Velero can authenticate to Azure: (1) by using a Velero-specific [service principal][20] with secret-based authentication; (2) by using a Velero-specific [service principal][20] with certificate-based authentication; (3) by using [Azure AD Workload Identity][23]; or (4) by using a storage account access key.
154
154
155
155
If you plan to use Velero to take Azure snapshots of your persistent volume managed disks, you **must** use the service principal or Azure AD Workload Identity method.
156
156
157
157
If you don't plan to take Azure disk snapshots, any method is valid.
158
158
159
159
### Specify Role
160
-
_**Note**: This is only required for (1) by using a Velero-specific service principal and (2) by using Azure AD Workload Identity._
160
+
_**Note**: This is only required for (1) by using a Velero-specific service principal with secret-based authentication, (2) by using a Velero-specific service principal with certificate-based authentication and (3) by using Azure AD Workload Identity._
161
161
162
162
1. Obtain your Azure Account Subscription ID:
163
163
```
@@ -241,15 +241,15 @@ There are two ways to specify the role: use the built-in role or create a custom
241
241
_(Optional) If you are using a different Subscription for backups and cluster resources, make sure to specify both subscriptions
242
242
inside `AssignableScopes`._
243
243
244
-
### Option 1: Create service principal
244
+
### Option 1: Create service principal with secret-based authentication
245
245
246
246
1. Obtain your Azure Account Tenant ID:
247
247
248
248
```bash
249
249
AZURE_TENANT_ID=`az account list --query '[?isDefault].tenantId' -o tsv`
250
250
```
251
251
252
-
2. Create a service principal.
252
+
2. Create a service principal with secet-based authentication.
253
253
254
254
If you'll be using Velero to backup multiple clusters with multiple blob containers, it may be desirable to create a unique username per cluster rather than the default `velero`.
255
255
@@ -296,7 +296,62 @@ There are two ways to specify the role: use the built-in role or create a custom
296
296
297
297
> Available values for `AZURE_CLOUD_NAME`: `AzurePublicCloud`, `AzureUSGovernmentCloud`, `AzureChinaCloud`
298
298
299
-
### Option 2: Use Azure AD Workload Identity
299
+
### Option 2: Create service principal with certificate-based authentication
300
+
301
+
1. Obtain your Azure Account Tenant ID:
302
+
303
+
```bash
304
+
AZURE_TENANT_ID=`az account list --query '[?isDefault].tenantId' -o tsv`
305
+
```
306
+
307
+
2. Create a service principal with certificate-based authentication.
308
+
309
+
If you'll be using Velero to backup multiple clusters with multiple blob containers, it may be desirable to create a unique username per cluster rather than the default `velero`.
310
+
311
+
Create service principal and let the CLI creates a self-signed certificate for you. Make sure to capture the certificate.
312
+
313
+
_(Optional) If you are using a different Subscription for backups and cluster resources, make sure to specify both subscriptions
0 commit comments