Steps to be Performed by Customer Account
Step 1: Create a User-Assigned Managed Identity
Navigate to the Azure Portal.
Search for Managed Identities and select it.
Click + Create
Choose your Subscription and Resource Group.
Enter a Name (e.g., customer).
Select the Region.
Click Review + Create, then Create.

Step 2: Add Federated Credentials
Open the newly created Managed Identity.

In the left menu, click Federated credentials.
Click + Add credential.
In Federated credential scenario, select Kubernetes accessing Azure resources.
Enter the following details:
Cluster Issuer URL: (based on your AKS cluster configuration)
Namespace: <namespace>
Service Account: <service-account>
Click Add.

Step 3: Assign Role-Based Access Control (RBAC) Permissions
Open the Managed Identity.
In the left menu, click Access control (IAM).
Click + Add role assignment.
Assign the following role(s):
Storage Blob Data Reader (read-only access)
Click Next, then select Managed Identity as the principal type.
Search for your identity (e.g., customer) and select it.
Click Review + Assign.
Step 4: Retrieve Identity Information
Open the Managed Identity.
From the Overview page, note down:
Client ID
Principal ID
These values will be used by e6data in Kubernetes and Azure services for secure authentication.
Step 5: Deploy in Serverless Account
After configuring the Managed Identity and role assignments, you can now deploy a Kubernetes pod in the Serverless Account to access storage in the Customer Account.
Last updated