Azure AD
Azure Active Directory (AD)
This page discusses creating and using an Azure AD-based authentication method in Akeyless.
Azure AD authentication enables Azure workloads to authenticate to Akeyless by using Azure-issued identity tokens.
Creating an Azure AD Authentication Method
This action is distinct from creating a new Akeyless account: it creates an additional Azure AD-based authentication method for an existing account.
Required Azure AD setting:
- Bound Tenant ID: Configure the Azure tenant ID that is allowed to authenticate by using this authentication method.
Required Azure AD fields with default values:
- Custom Issuer URL: Prefilled with
https://sts.windows.net/<bound-tenant-id>/. - Custom JWKS URL: Prefilled with
https://login.microsoftonline.com/common/discovery/keys. - Custom Audience URL: Prefilled with
https://management.azure.com/.
Azure Identity Prerequisite
Enable a managed identity on the Azure resource that authenticates to Akeyless. You can use either a system-assigned identity (tied to a single resource lifecycle) or a user-assigned identity (reusable across multiple resources). Make sure the identity is enabled on the source workload before running akeyless configure or akeyless auth with azure_ad.
Creating an Azure AD Authentication Method with the Console
To create a new Azure AD-based authentication method with the Console:
- In the Console, under Administration, navigate to Users & Auth Methods.
- Select + New. This opens the Create Authentication Method form.
- On the Type selection screen, select Azure AD, then Next →.
- Enter a name for the Authentication Method in the Name field. Optionally, include a path using
/separators to place the Authentication Method in a virtual folder, then select Next →. - Configure Azure AD-specific fields, such as Bound Tenant ID. For field details, see Azure AD-Specific Optional Features, then select Next →.
- Configure Advanced Azure AD-specific fields, then select Finish.
Creating an Azure AD Authentication Method with the CLI
To create an Azure AD-based authentication method with the CLI:
akeyless auth-method create azure-ad \
--name <Azure AD Auth Method Name> \
--bound-tenant-id <Azure Tenant ID>Read about more parameters available when creating an Azure AD-based authentication method.
Using an Azure AD Authentication Method
Using an Azure AD Authentication Method with the CLI
To use an Azure AD-based authentication method with a CLI profile, run the Akeyless configure command from an Azure resource with managed identity enabled:
akeyless configure \
--profile default \
--access-id <Access ID> \
--access-type azure_adFor Azure US Government or Azure China, also set --azure-cloud to AzureUSGovernment or AzureChinaCloud.
Note:Identities that require
--azure-cloud(for example, Azure US Government or Azure China) are not supported for use as a Gateway identity.
To inspect the cloud identity token, run the Akeyless get-cloud-identity command:
akeyless get-cloud-identity \
--cloud-provider azure_adFor Azure US Government or Azure China, also set --azure-cloud to AzureUSGovernment or AzureChinaCloud.
To authenticate and retrieve a temporary Akeyless token, run the Akeyless auth command:
akeyless auth \
--access-id <Access ID> \
--access-type azure_adFor Azure US Government or Azure China, also set --azure-cloud to AzureUSGovernment or AzureChinaCloud.
Optional Features
For optional features that apply across Authentication Methods, see Common Optional Features.
Azure AD-Specific Optional Features
- Bound Group IDs: Limit authentication to one or more Azure AD group IDs.
In the Console, enter values as a comma-separated list. With the CLI, repeat
--bound-group-id. - Bound Resource Groups: Limit authentication to resources in one or more Azure resource groups.
In the Console, enter values as a comma-separated list. With the CLI, repeat
--bound-rg-id. - Bound Resource IDs: Limit authentication to one or more full Azure resource IDs.
In the Console, enter values as a comma-separated list. With the CLI, repeat
--bound-resource-id. - Bound Resource Names: Limit authentication to one or more Azure resource names.
In the Console, enter values as a comma-separated list. With the CLI, repeat
--bound-resource-names. - Bound Resource Providers: Limit authentication to one or more Azure resource providers (for example,
Microsoft.Compute,Microsoft.ManagedIdentity). In the Console, enter values as a comma-separated list. With the CLI, repeat--bound-providers. - Bound Resource Types: Limit authentication to one or more Azure resource types (for example,
virtualMachines,userAssignedIdentities). In the Console, enter values as a comma-separated list. With the CLI, repeat--bound-resource-types. - Bound Service Principal IDs: Limit authentication to one or more Azure AD service principal IDs.
In the Console, enter values as a comma-separated list. With the CLI, repeat
--bound-spid. - Bound Subscription IDs: Limit authentication to one or more Azure subscription IDs.
In the Console, enter values as a comma-separated list. With the CLI, repeat
--bound-sub-id. - Custom Audience URL: Override the expected audience claim value.
Global default is
https://management.azure.com/. For Azure US Government, usehttps://management.usgovcloudapi.net/. For Azure China, usehttps://management.chinacloudapi.cn/. CLI note: the--audienceflag is supported but marked deprecated. - Custom Issuer URL: Override the issuer URL used to validate Azure-issued tokens. If not set, the default pattern is
https://sts.windows.net/<bound-tenant-id>/. - Custom JWKS URL: Override the JSON Web Key Set (JWKS) endpoint used for JWT signature verification.
Global default is
https://login.microsoftonline.com/common/discovery/keys. For Azure US Government, usehttps://login.microsoftonline.us/common/discovery/keys. For Azure China, usehttps://login.chinacloudapi.cn/common/discovery/keys. - Unique Identifier: Set a sub-claim key used to uniquely identify authenticated Azure principals.
Updated 12 days ago
Make sure to associate your new Authentication Method with an Access Role to grant the relevant permissions within Akeyless
