Static Kubernetes ServiceAccount tokens are a long-standing security risk.
This post walks through authenticating workloads to HashiCorp Vault using JWT/OIDC, exchanging pod identity for short-lived, least-privilege Vault tokens via a Kubernetes-aware STS—without relying on static credentials.

#Kubernetes #HashiCorpVault #OIDC #WorkloadIdentity #ZeroTrust
https://www.tremolo.io/post/short-lived-tokens-with-vault-without-the-static-serviceaccount

Short Lived Tokens With Vault Without The Static ServiceAccount

Learn how to securely authenticate Kubernetes workloads with HashiCorp Vault using short-lived tokens instead of static ServiceAccount credentials. This post explains why long-lived ServiceAccount tokens are a security risk and shows how to use JWT/OIDC-based authentication and a Kubernetes-aware STS to issue ephemeral Vault tokens, improving workload identity, least-privilege access, and secret security in Kubernetes..

Y'all ever get that feeling that surely you can't be the first one that actually tries to use a software feature as documented, but how could anyone ever have used it considering that it's fundamentally broken? And there are zero bug reports about your issue?!

This is me right now with #Nomad #WorkloadIdentity w/ #Consul. Clearly I'm doing something terribly wrong, because for me the bit that's supposed to keep the Consul token valid and renewed is doing a whole lot of renewing of the JWT token, but not any of the renewing the Consul side access token it gives you. Even worse than that, every JWT renew causes a change_mode trigger, i.e. a task restart, because it's changed! Yeah sure, you fiddled with the JWT yes, but the Consul token is still super valid? So what was there to re-render?

And yeah, the latest Nomad version makes the use of these mandatory. The feature was first published late 2023 but I've been putting it off, because very complex. Going on day 16 now of trying to get ready for the upgrade. 

まともなTerraform環境構築に向けたあれこれ:バックエンドGCS、Workload Identity直接アクセス、tfactionによるCI/CD
https://qiita.com/SoySoySoyB/items/bb3abcf596111ded326b?utm_campaign=popular_items&utm_medium=feed&utm_source=popular_items

#qiita #Terraform #CICD #WorkloadIdentity #tfaction

まともなTerraform環境構築に向けたあれこれ:バックエンドGCS、Workload Identity直接アクセス、tfactionによるCI/CD - Qiita

はじめに以前、初心者ながらTerraformを使ってみた記事(「TROCCO®のTerraform Provider(β版)ができたので最速で触ってみる」)を書きました。このときはローカルでの実行…

Qiita
General Availability for Azure Active Directory (AD) Workload Identity on AKS

Workload Identity is an open-source project that enables Federated Identity in Kubernetes clusters. It is the next evolution of a public preview feature in Azure Kubernetes Service (AKS), that is built on the now deprecated pod identity project. Azure AD Workload Identity, is simpler to use and repl...

TECHCOMMUNITY.MICROSOFT.COM
well that was fun. got #tornjak integrated with #keycloak successfully. Want to try it out for yourself? Theres a great blog to walk you through the process #spiffe #WorkloadIdentity https://medium.com/universal-workload-identity/guide-to-integrating-tornjak-with-keycloak-for-access-control-to-spire-40a3d5ee5f5a
Guide to integrating Tornjak with Keycloak for access control to SPIRE

This is a step-by-step guide to integrating Tornjak with Keycloak as an example OAuth2.0 server. For more background information, please see the following blogs: Today, we will focus on the…

Universal Workload Identity