Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Utilize Managed Identity and remove any access keys from environment variables. #674

Closed
SebastianClaesson opened this issue Mar 1, 2024 · 1 comment
Assignees
Labels
enhancement New feature or request

Comments

@SebastianClaesson
Copy link

Is your feature request related to a problem? Please describe.
Storage Account keys are sensitive as they provide access to the underlying storage account.
These keys must be protected.
For example, the azure function interacts with it's underlying storage account using keys through the following environment variables;

  • AzureWebJobsStorage
  • WEBSITE_CONTENTAZUREFILECONNECTIONSTRING

Describe the solution you'd like
To protect the storage account keys, they can be protected by an Azure key vault, where the Azure functions managed identity have access to.
It must use the Managed identity to connect to the host storage account.
Ref; Connecting to host storage with an identity

@shibayan
Copy link
Owner

shibayan commented Mar 1, 2024

I don't deny the use of Managed Identity across the board in environments that require more zero-trust, but I don't see the need to provide it as the default deployment template.

Acmebot can be used by simply specifying the URL of the Zip package, so it is easy to customize it for each environment.

@shibayan shibayan closed this as not planned Won't fix, can't repro, duplicate, stale Mar 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants