Azure AD
Azure Active Directory (AD)
This page discusses creating and using an Azure AD-based authentication method in Akeyless.
Azure AD authentication enables Azure workloads to authenticate to Akeyless by using Azure-issued identity tokens.
Creating an Azure AD Authentication Method
This action is distinct from creating a new Akeyless account: it creates an additional Azure AD-based authentication method for an existing account.
Required Azure AD setting:
- Bound Tenant ID: Configure the Azure tenant ID that is allowed to authenticate by using this authentication method.
Required Azure AD fields with default values:
- Custom Issuer URL: Prefilled with
https://sts.windows.net/<bound-tenant-id>/. - Custom JWKS URL: Prefilled with
https://login.microsoftonline.com/common/discovery/keys. - Custom Audience URL: Prefilled with
https://management.azure.com/.
Azure Identity Prerequisite
Enable a managed identity on the Azure resource that authenticates to Akeyless. You can use either a system-assigned identity (tied to a single resource lifecycle) or a user-assigned identity (reusable across multiple resources). Make sure the identity is enabled on the source workload before running akeyless configure or akeyless auth with azure_ad.
Creating an Azure AD Authentication Method with the Console
To create a new Azure AD-based authentication method with the Console:
- In the Console, under Administration, navigate to Users & Auth Methods.
- Select + New. This opens the Create Authentication Method form.
- On the Type selection screen, select Azure AD, then Next →.
- Enter a name for the Authentication Method in the Name field. Optionally, include a path using
/separators to place the Authentication Method in a virtual folder, then select Next →. - Configure Azure AD-specific fields, such as Bound Tenant ID. For field details, see Azure AD-Specific Optional Features, then select Next →.
- Configure Advanced Azure AD-specific fields, then select Finish.
Creating an Azure AD Authentication Method with the CLI
To create an Azure AD-based authentication method with the CLI:
akeyless auth-method create azure-ad \
--name <Azure AD Auth Method Name> \
--bound-tenant-id <Azure Tenant ID>Read about more parameters available when creating an Azure AD-based authentication method.
Using an Azure AD Authentication Method
Using an Azure AD Authentication Method with the CLI
To use an Azure AD-based authentication method with a CLI profile, run the Akeyless configure command from an Azure resource with managed identity enabled:
akeyless configure \
--profile default \
--access-id <Access ID> \
--access-type azure_adFor Azure US Government or Azure China, also set --azure-cloud to AzureUSGovernment or AzureChinaCloud.
Note:Identities that require
--azure-cloud(for example, Azure US Government or Azure China) are not supported for use as a Gateway identity.
To inspect the cloud identity token, run the Akeyless get-cloud-identity command:
akeyless get-cloud-identity \
--cloud-provider azure_adFor Azure US Government or Azure China, also set --azure-cloud to AzureUSGovernment or AzureChinaCloud.
To authenticate and retrieve a temporary Akeyless token, run the Akeyless auth command:
akeyless auth \
--access-id <Access ID> \
--access-type azure_adFor Azure US Government or Azure China, also set --azure-cloud to AzureUSGovernment or AzureChinaCloud.
Optional Features
For optional features that apply across Authentication Methods, see Common Optional Features.
Azure AD-Specific Optional Features
- Bound Group IDs: Limit authentication to one or more Azure AD group IDs.
In the Console, enter values as a comma-separated list. With the CLI, repeat
--bound-group-id. - Bound Resource Groups: Limit authentication to resources in one or more Azure resource groups.
In the Console, enter values as a comma-separated list. With the CLI, repeat
--bound-rg-id. - Bound Resource IDs: Limit authentication to one or more full Azure resource IDs.
In the Console, enter values as a comma-separated list. With the CLI, repeat
--bound-resource-id. - Bound Resource Names: Limit authentication to one or more Azure resource names.
In the Console, enter values as a comma-separated list. With the CLI, repeat
--bound-resource-names. - Bound Resource Providers: Limit authentication to one or more Azure resource providers (for example,
Microsoft.Compute,Microsoft.ManagedIdentity). In the Console, enter values as a comma-separated list. With the CLI, repeat--bound-providers. - Bound Resource Types: Limit authentication to one or more Azure resource types (for example,
virtualMachines,userAssignedIdentities). In the Console, enter values as a comma-separated list. With the CLI, repeat--bound-resource-types. - Bound Service Principal IDs: Limit authentication to one or more Azure AD service principal IDs.
In the Console, enter values as a comma-separated list. With the CLI, repeat
--bound-spid. - Bound Subscription IDs: Limit authentication to one or more Azure subscription IDs.
In the Console, enter values as a comma-separated list. With the CLI, repeat
--bound-sub-id. - Custom Audience URL: Override the expected audience claim value.
Global default is
https://management.azure.com/. For Azure US Government, usehttps://management.usgovcloudapi.net/. For Azure China, usehttps://management.chinacloudapi.cn/. CLI note: the--audienceflag is supported but marked deprecated. - Custom Issuer URL: Override the issuer URL used to validate Azure-issued tokens. If not set, the default pattern is
https://sts.windows.net/<bound-tenant-id>/. - Custom JWKS URL: Override the JSON Web Key Set (JWKS) endpoint used for JWT signature verification.
Global default is
https://login.microsoftonline.com/common/discovery/keys. For Azure US Government, usehttps://login.microsoftonline.us/common/discovery/keys. For Azure China, usehttps://login.chinacloudapi.cn/common/discovery/keys. - Unique Identifier: Set a sub-claim key used to uniquely identify authenticated Azure principals.
Updated about 1 month ago
Make sure to associate your new Authentication Method with an Access Role to grant the relevant permissions within Akeyless
