MENU

Fun & Interesting

Managed Identities for Azure Resources System - User Assigned Explained

Pavan Kumar 728 4 years ago
Video Not Working? Fix It Now

managed identities for Azure resources A common challenge for developers is the management of secrets and credentials to secure communication between different services. On Azure, managed identities eliminate the need for developers having to manage credentials by providing an identity for the Azure resource in Azure AD and using it to obtain Azure Active Directory (Azure AD) tokens. This also helps accessing Azure Key Vault where developers can store credentials in a secure manner. Managed identities for Azure resources solves this problem by providing Azure services with an automatically managed identity in Azure AD. Here are some of the benefits of using Managed identities for Azure Resources: You don't need to manage credentials. Credentials are not even accessible to you. You can use managed identities to authenticate to any Azure service that supports Azure AD authentication including Azure Key Vault. Managed identities can be used without any additional cost. Managed identity types There are two types of managed identities: System-assigned Some Azure services allow you to enable a managed identity directly on a service instance. When you enable a system-assigned managed identity an identity is created in Azure AD that is tied to the lifecycle of that service instance. So when the resource is deleted, Azure automatically deletes the identity for you. By design, only that Azure resource can use this identity to request tokens from Azure AD. User-assigned You may also create a managed identity as a standalone Azure resource. You can create a user-assigned managed identity and assign it to one or more instances of an Azure service. In the case of user-assigned managed identities, the identity is managed separately from the resources that use it.

Comment