<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Authenticate to Azure on Dapr Docs</title><link>https://v1-18.docs.dapr.io/developing-applications/integrations/azure/azure-authentication/</link><description>Recent content in Authenticate to Azure on Dapr Docs</description><generator>Hugo</generator><language>en</language><atom:link href="https://v1-18.docs.dapr.io/developing-applications/integrations/azure/azure-authentication/index.xml" rel="self" type="application/rss+xml"/><item><title>Authenticating to Azure</title><link>https://v1-18.docs.dapr.io/developing-applications/integrations/azure/azure-authentication/authenticating-azure/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://v1-18.docs.dapr.io/developing-applications/integrations/azure/azure-authentication/authenticating-azure/</guid><description>&lt;h2 id="about-authentication-with-microsoft-entra-id">About authentication with Microsoft Entra ID&lt;/h2>
&lt;p>Microsoft Entra ID is Azure&amp;rsquo;s identity and access management (IAM) solution, which is used to authenticate and authorize users and services. It&amp;rsquo;s built on top of open standards such OAuth 2.0, which allows services (applications) to obtain access tokens to make requests to Azure services, including Azure Storage, Azure Service Bus, Azure Key Vault, Azure Cosmos DB, Azure Database for Postgres, Azure SQL, etc.&lt;/p></description></item><item><title>How to: Use workload identity federation</title><link>https://v1-18.docs.dapr.io/developing-applications/integrations/azure/azure-authentication/howto-wif/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://v1-18.docs.dapr.io/developing-applications/integrations/azure/azure-authentication/howto-wif/</guid><description>&lt;p>This guide will help you configure your Kubernetes cluster to run Dapr with Azure workload identity federation.&lt;/p>
&lt;h2 id="what-is-it">What is it?&lt;/h2>
&lt;p>&lt;a href="https://learn.microsoft.com/entra/workload-id/workload-identities-overview">Workload identity federation&lt;/a>
is a way for your applications to authenticate to Azure without having to store or manage credentials as part of
your releases.&lt;/p>
&lt;p>By using workload identity federation, any Dapr components running on Kubernetes and AKS that target Azure can authenticate transparently
with no extra configuration.&lt;/p>
&lt;h2 id="guide">Guide&lt;/h2>
&lt;p>We&amp;rsquo;ll show how to configure an Azure Key Vault resource against your AKS cluster. You can adapt this guide for different
Dapr Azure components by substituting component definitions as necessary.&lt;/p></description></item><item><title>How to: Generate a new Microsoft Entra ID application and Service Principal</title><link>https://v1-18.docs.dapr.io/developing-applications/integrations/azure/azure-authentication/howto-aad/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://v1-18.docs.dapr.io/developing-applications/integrations/azure/azure-authentication/howto-aad/</guid><description>&lt;h2 id="prerequisites">Prerequisites&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://azure.microsoft.com/free/">An Azure subscription&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://docs.microsoft.com/cli/azure/install-azure-cli">Azure CLI&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://stedolan.github.io/jq/download/">jq&lt;/a>&lt;/li>
&lt;li>OpenSSL (included by default on all Linux and macOS systems, as well as on WSL)&lt;/li>
&lt;li>Make sure you&amp;rsquo;re using a bash or zsh shell&lt;/li>
&lt;/ul>
&lt;h2 id="log-into-azure-using-the-azure-cli">Log into Azure using the Azure CLI&lt;/h2>
&lt;p>In a new terminal, run the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-sh" data-lang="sh">&lt;span style="display:flex;">&lt;span>az login
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>az account &lt;span style="color:#204a87">set&lt;/span> -s &lt;span style="color:#ce5c00;font-weight:bold">[&lt;/span>your subscription id&lt;span style="color:#ce5c00;font-weight:bold">]&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;h3 id="create-an-microsoft-entra-id-application">Create an Microsoft Entra ID application&lt;/h3>
&lt;p>Create the Microsoft Entra ID application with:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-sh" data-lang="sh">&lt;span style="display:flex;">&lt;span>&lt;span style="color:#8f5902;font-style:italic"># Friendly name for the application / Service Principal&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#000">APP_NAME&lt;/span>&lt;span style="color:#ce5c00;font-weight:bold">=&lt;/span>&lt;span style="color:#4e9a06">&amp;#34;dapr-application&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#8f5902;font-style:italic"># Create the app&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#000">APP_ID&lt;/span>&lt;span style="color:#ce5c00;font-weight:bold">=&lt;/span>&lt;span style="color:#204a87;font-weight:bold">$(&lt;/span>az ad app create --display-name &lt;span style="color:#4e9a06">&amp;#34;&lt;/span>&lt;span style="color:#4e9a06">${&lt;/span>&lt;span style="color:#000">APP_NAME&lt;/span>&lt;span style="color:#4e9a06">}&lt;/span>&lt;span style="color:#4e9a06">&amp;#34;&lt;/span> &lt;span style="color:#000;font-weight:bold">|&lt;/span> jq -r .appId&lt;span style="color:#204a87;font-weight:bold">)&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Select how you&amp;rsquo;d prefer to pass credentials.&lt;/p></description></item><item><title>How to: Use managed identities</title><link>https://v1-18.docs.dapr.io/developing-applications/integrations/azure/azure-authentication/howto-mi/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://v1-18.docs.dapr.io/developing-applications/integrations/azure/azure-authentication/howto-mi/</guid><description>&lt;p>Using managed identities, authentication happens automatically by virtue of your application running on top of an Azure service that has either a system-managed or a user-assigned identity.&lt;/p>
&lt;p>To get started, you need to enable a managed identity as a service option/functionality in various Azure services, independent of Dapr. Enabling this creates an identity (or application) under the hood for Microsoft Entra ID (previously Azure Active Directory ID) purposes.&lt;/p>
&lt;p>Your Dapr services can then leverage that identity to authenticate with Microsoft Entra ID, transparently and without you having to specify any credentials.&lt;/p></description></item></channel></rss>