Using OIDC with GitHub Actions and Terraform

แชร์
ฝัง
  • เผยแพร่เมื่อ 15 ต.ค. 2024

ความคิดเห็น • 18

  • @robinmordasiewicz
    @robinmordasiewicz ปีที่แล้ว +1

    jeez, this guy is a serious pro. nice videos and amazing explanations.

  • @ehmidashrif804
    @ehmidashrif804 ปีที่แล้ว +1

    Thanks for covering this topic. Great content

  • @mikeestes4956
    @mikeestes4956 ปีที่แล้ว +3

    I think the use case for setting the Issue to something besides the default is when you're using your own instance of Github.
    Also, it would have been useful to show the part where you gave the registered App the permissions it needed to do what it needed to do. For some reason I forgot that you didn't show it and was trying to figure out why it wasn't working. You need the role set in order for it to see or do what it needs to do first. In my case this was not for applying terraform but at least showing that would have given me a bit more context for what was needed here.

    • @NedintheCloud
      @NedintheCloud  ปีที่แล้ว

      Thanks for the feedback Mike. Sorry for the confusion!

    • @mikeestes4956
      @mikeestes4956 ปีที่แล้ว

      @@NedintheCloud All good, you got me the majority of the way to figuring out how to use this to begin with. Much appreciated.

  • @soumyarahul007
    @soumyarahul007 2 ปีที่แล้ว

    Thanks Ned. The content is super useful.. and this is what I was looking for..

  • @countbrapcula-espana
    @countbrapcula-espana 6 หลายเดือนก่อน

    Do you have a TT video that does exactly this but uses Azure DevOps Pipelines and configuration with Azure DevOps Service Connection. Essentially a clone of this but not using GHA ? Or are the changes to take this and change to ADO 90% the same plus the differences?

    • @NedintheCloud
      @NedintheCloud  6 หลายเดือนก่อน

      Service connections in Azure DevOps now support OIDC natively, so you don't have to set up a service principal and federated credentials.

  • @vilyduytruong4885
    @vilyduytruong4885 ปีที่แล้ว +1

    Many thanks ❤

  • @dreamingaboutouterspace3878
    @dreamingaboutouterspace3878 2 ปีที่แล้ว

    Ned, do you have a video/example using ADO pipeline parameter values getting passed as a variable in your variables.tf. Thanks.

  • @bharathkumarkn8009
    @bharathkumarkn8009 7 หลายเดือนก่อน

    Thanks for this topic. how to use multi repo for single federated credentials and how to manage subject cliam in that condition

    • @NedintheCloud
      @NedintheCloud  6 หลายเดือนก่อน

      Azure AD (Entra ID) doesn't support wildcards, so you need to add a federated credential for each repo, branch, and PR. I don't love that, but you can use Terraform to do it for you!

  • @testydevops9356
    @testydevops9356 ปีที่แล้ว +1

    I don't know how to do this on AWS Cloud. What will change?

    • @NedintheCloud
      @NedintheCloud  ปีที่แล้ว

      The main point is to remove long lived passwords/credentials. There's good documentation from Github on how to set it up: docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services

  • @WilsonMar1
    @WilsonMar1 ปีที่แล้ว +1

    This for Azure AD

  • @luismendezescobar9049
    @luismendezescobar9049 2 ปีที่แล้ว

    hi Need could do a video of this same implementation in google cloud please?