-
Notifications
You must be signed in to change notification settings - Fork 3.4k
Description
Related command
az disk-encryption-set create --federatedClientId "13ebe945-1314-41b4-8b58-f3784e0dd278" --identityType "UserAssigned" --userAssignedIdentities "{ /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName} :{}}"
az disk-encryption-set update --federatedClientId "13ebe945-1314-41b4-8b58-f3784e0dd278" --identityType "UserAssigned" --userAssignedIdentities "{ /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName} :{}}"
Resource Provider
<Microsoft.Azure.Management.Compute (specifically DiskRP)>
Description of Feature or Work Requested
Customer can use multi-tenant application client id to access key vault in a different tenant. Setting federatedClientId to 'None' will clear the property.
Need to support new identityTypes. Previously the default identityType is systemAssigned, now CLI need to support 2 more options for identityType: UserAssigned, and "SystemAssigned, UserAssigned".
UserAssignedIdentities is a dictionary with key-value pairs.
Powershell design:
https://github.com/Azure/azure-powershell-cmdlet-review-pr/issues/1196
Minimum API Version Required
<2021-08-01>
Swagger Link
Azure/azure-rest-api-specs#18866
Target Date
<July 8th,2022>