Skip to content

Commit fce402f

Browse files
Update pmp-configure-azure-key-vault.md
1 parent aa0f4ab commit fce402f

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

content/en/docs/private-platform/configuration/pmp-configure-azure-key-vault.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -226,6 +226,10 @@ spec:
226226

227227
#### Configuring the Kubernetes Service Account
228228

229+
To enable Azure AD Workload Identity, the Kubernetes Service Account used by your Private Mendix Platform application needs specific annotations to link it to the Azure User-Assigned Managed Identity. You have two options: use a dedicated custom Service Account or use the existing default Service Account in your application's namespace.
230+
231+
Using a Custom Service Account is recommended for better isolation. This involves creating a new Service Account specifically for your Mendix application to access secrets. The default service account already exists in every Kubernetes namespace. It's simpler but provides less isolation if other applications in the same namespace also use the default Service Account.
232+
229233
To configure the Kubernetes service account, perform the following steps:
230234

231235
1. Create a Kubernetes service account with the name you specified above (for example, **pmp-secret-accessor**).

0 commit comments

Comments
 (0)