Permissions required by Kyvos Managed Identity
Case 1: Dedicated AKS Cluster
Built-in Azure Kubernetes Service Cluster User Role on AKS
Built-in Reader on AKS
Built-in Virtual Machine Contributor on Managed Resource Group
Microsoft.ContainerService/managedClusters/agentPools/write" on AKS
Microsoft.ContainerService/managedClusters/agentPools/read" on AKS
Microsoft.ContainerService/managedClusters/agentPools/delete" on AKS
Case 2: Shared AKS Cluster
Permission is same as dedicated AKS Cluster
Both Namespaces (compute and monitoring) must be already created.
Case 3: Dedicated Node pool
Built-in Azure Kubernetes Service Cluster User Role on AKS
Built-in Reader on AKS
Built-in Virtual Machine Contributor on VMSS of Node pool
Microsoft.ContainerService/managedClusters/agentPools/write" on AKS
Microsoft.ContainerService/managedClusters/agentPools/read" on AKS
Microsoft.ContainerService/managedClusters/agentPools/delete" on AKS
Case 4: Shared Node pool
Built-in Azure Kubernetes Service Cluster User Role on AKS
Built-in Reader on AKS
Permission required by Kubernetes Managed Identity
Built-in Managed Identity Operator on this Managed Identity itself
(Note: this is required to create on AKS cluster if it is created externally)Built-in Storage Blob Data Contributor on Kyvos storage account
Built-in Reader on AKS
Create Access policy to get secret on Kyvos key Vault
In case of Enhanced Security
AKS Subnet must be allowed in networking rules of Kyvos storage account.
AKS Subnet must be allowed in networking rules of Kyvos key Vault.