Skip to content

Add "federatedClientId" and UserAssignedIdentities for disk api version 2022-03-02 for public preview #22350

@laurawu19

Description

@laurawu19

Related command
az disk-encryption-set create --federatedClientId "13ebe945-1314-41b4-8b58-f3784e0dd278" --identityType "UserAssigned" --userAssignedIdentities "{ /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName} :{}}"

az disk-encryption-set update --federatedClientId "13ebe945-1314-41b4-8b58-f3784e0dd278" --identityType "UserAssigned" --userAssignedIdentities "{ /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName} :{}}"

Resource Provider
<Microsoft.Azure.Management.Compute (specifically DiskRP)>

Description of Feature or Work Requested
Customer can use multi-tenant application client id to access key vault in a different tenant. Setting federatedClientId to 'None' will clear the property.

Need to support new identityTypes. Previously the default identityType is systemAssigned, now CLI need to support 2 more options for identityType: UserAssigned, and "SystemAssigned, UserAssigned".

UserAssignedIdentities is a dictionary with key-value pairs.

Powershell design:
https://github.com/Azure/azure-powershell-cmdlet-review-pr/issues/1196

Minimum API Version Required
<2021-08-01>

Swagger Link
Azure/azure-rest-api-specs#18866

Target Date
<July 8th,2022>

Metadata

Metadata

Labels

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions