Vault: Add Azure AAD Auth Backend

Created on 21 Nov 2017  路  6Comments  路  Source: hashicorp/vault


Feature Request:
Add Azure AAD as an authentication backend. Ideally, this would be configurable and allow for a few separate authentication workflows (service principal, device, CLI token, etc) and allow for flexibility in AAD endpoints. Doing this work would not be an alternative to #2525.

Most helpful comment

An Azure AD auth backend using Managed Service Identity is being added in Vault 0.10 which is in RC right now and will be released soon!

All 6 comments

I would really love this. I understand that AWS and GCP seem to have more priority, but AAD for an auth backend would be great. So many organizations have Office 365, and as such have Azure AD, that it would make sense to create this auth backend.

A lot of people are building products spanning aws, gcp, and azure. This would allow more parity across people managing deployments across all the clouds. Would love this!

It seems like an integration with Azure AD Managed Service Identity would give parity to AWS IAM role authentication:
https://docs.microsoft.com/en-us/azure/active-directory/managed-service-identity/overview

An Azure AD auth backend using Managed Service Identity is being added in Vault 0.10 which is in RC right now and will be released soon!

Hi,
I'm on vault v0.10.3 and when i try to enable secret engine azure "vault secrets enable azure", it is throwing an error as "unknown backend type : azure", I see in HashiCorp documentation says it supports azure secrets engine, am I missing something here, any suggestions would be appricated.

Azure Secrets is different than Azure Auth. The secrets engine was introduced in v0.11.

Was this page helpful?
0 / 5 - 0 ratings

Related issues

jweissig picture jweissig  路  44Comments

weakcamel picture weakcamel  路  51Comments

Miserlou picture Miserlou  路  45Comments

mwitkow picture mwitkow  路  142Comments

justintime picture justintime  路  55Comments