🌐
Microsoft Learn
learn.microsoft.com › en-us › entra › workload-id › workload-identity-federation
Workload Identity Federation - Microsoft Entra Workload ID | Microsoft Learn
You use workload identity federation to configure a user-assigned managed identity or app registration in Microsoft Entra ID to trust tokens from an external identity provider (IdP), such as GitHub or Google.
🌐
GitHub
github.com › marketplace › actions › azure-ad-workload-identity-federation
Azure AD Workload Identity Federation - GitHub Marketplace
This GitHub action acquires access tokens (JWTs) for federated Azure AD workload identities that have configured GitHub as Open ID Connect (OIDC) credential provider.
Discussions

Federated Workload Identity: Service Principal vs Managed Idenity for GitHub Actions
my take is: If I can make managed identity work and not have to deal with handling secrets I do it. SP's are fallback, and it annoys me when MS services (ahem, Fabric) use them. More on reddit.com
🌐 r/AZURE
29
12
August 23, 2025
How to set up Workload Identity Federation to securely authorize Github Actions workflows to manage Google Cloud resources
How does it work from inside the worker? Let's say I want to initialize gcloud, where do I get credentials? More on reddit.com
🌐 r/googlecloud
11
8
February 22, 2025
Workload Identity Federation (WIF) is one such gem, enabling secure, keyless authentication
Thanks for sharing. The last part with recommendations for GCP caught my attention. If there are other suggestions from the broader community around WIF, we're always open to listening. More on reddit.com
🌐 r/googlecloud
32
48
May 13, 2025
🌐
DEV Community
dev.to › massimobonanni › azure-workload-identity-federation-and-github-actions-pf7
Azure Workload Identity Federation and GitHub Actions - DEV Community
May 2, 2023 - This approach was born to trust tokens from external identity provider, such as GitHub or Google (or other in the future). You first create a relationship between the identity (that can be a managed identity or an App registration) and the external identity provider. Once this relationship is created, every time the workload wants to authenticate itself against AzureAD, it retrieves a token from the external IdP and, uses it to request access token from AAD.
🌐
GitHub
docs.github.com › en › actions › security-for-github-actions › security-hardening-your-deployments › configuring-openid-connect-in-azure
Configuring OpenID Connect in Azure - GitHub Docs
This guide gives an overview of how to configure Azure to trust GitHub's OIDC as a federated identity, and includes a workflow example for the azure/login action that uses tokens to authenticate to Azure and access resources.
🌐
Microsoft Learn
learn.microsoft.com › en-us › samples › azure-samples › github-terraform-oidc-ci-cd › github-terraform-oidc-ci-cd
Using GitHub Actions Workload identity federation (OIDC) with Azure for Terraform Deployments - Code Samples | Microsoft Learn
March 2, 2026 - Workload Identity Federation (OIDC): The User Assigned Managed Identities are configured to use Workload Identity Federation (OIDC) authenticate to Azure. This means that you don't need to store any secrets in GitHub.
🌐
GitHub
github.com › Azure-Samples › azure-ad-workload-identity-mi
GitHub - Azure-Samples/azure-ad-workload-identity-mi: This project shows how to use Azure AD workload identity with a user-assigned managed identity in a .NET Standard application running on Azure Kubernetes Service. · GitHub
For example, a workload stores files in Azure Storage, and when it needs to access those files, the pod authenticates itself against the resource as an Azure-managed identity. This authentication method has been replaced with AzureAD workload identity, which integrates with the Kubernetes native capabilities to federate with any external identity provider.
Starred by 9 users
Forked by 3 users
Languages   Bicep 38.8% | C# 34.2% | Shell 22.2% | HTML 3.1% | Smarty 1.1% | Dockerfile 0.4%
🌐
OneUptime
oneuptime.com › home › blog › how to configure microsoft entra workload identity federation for github
How to Configure Microsoft Entra Workload Identity Federation for GitHub
February 16, 2026 - Instead of using secrets, your GitHub Actions workflow authenticates to Azure using a short-lived OIDC token issued by GitHub. No secrets to store, no secrets to rotate, no secrets to leak.
🌐
Microsoft Learn
learn.microsoft.com › en-us › azure › databricks › dev-tools › auth › provider-github
Enable workload identity federation for GitHub Actions - Azure Databricks | Microsoft Learn
January 16, 2026 - Audiences: Databricks recommends setting this to your Azure Databricks account ID. If omitted, the account ID is used by default. Subject claim: (Optional) The JWT claim that contains the workload identity (sub) value from the OIDC token. For GitHub, leave the field as sub, which encodes the repository, branch, tag, pull/merge request, or environment that triggered the workflow. For example, the following Databricks CLI command creates a federation policy for an organization named my-org and a Databricks service principal numeric ID of 5581763342009999:
Find elsewhere
🌐
Google
docs.cloud.google.com › iam › identity and access management (iam) › configure workload identity federation with deployment pipelines
Configure Workload Identity Federation with deployment pipelines | Identity and Access Management (IAM) | Google Cloud Documentation
Azure DevOps pipelines can use a Microsoft Entra workload identity federation service connection to obtain an ID token that uniquely identifies the Azure DevOps project. GitHub Actions workflows can obtain a GitHub OIDC token that uniquely ...
🌐
PyRIT
azure.github.io › azure-workload-identity › docs › concepts.html
Concepts - Azure AD Workload Identity
Users who used aad-pod-identity ... and annotations to configure. Using workload identity federation allows you to access Azure Active Directory (Azure AD) protected resources without needing to manage secrets....
🌐
GitHub
github.com › Azure-Samples › azure-ad-workload-identity
GitHub - Azure-Samples/azure-ad-workload-identity: This project shows how to use Azure AD workload identity for Kubernetes in a .NET Standard application running on Azure Kubernetes Service. It leverages the public preview capability of Azure AD workload identity federation.
You can use the scripts/08-create-service-account.sh script to create a Kubernetes service account in the application namespace and annotate it with the client ID of the Azure AD application. The last step of the script establishes federated identity credential between the AAD application and the service account issuer and subject.
Starred by 26 users
Forked by 14 users
Languages   Bicep 43.5% | C# 29.7% | Shell 22.8% | HTML 2.6% | Smarty 0.9% | Dockerfile 0.3% | Bicep 43.5% | C# 29.7% | Shell 22.8% | HTML 2.6% | Smarty 0.9% | Dockerfile 0.3%
🌐
To The New
tothenew.com › home › modern authentication with azure workload identity federation
Modern authentication with Azure workload identity federation | TO THE NEW Blog
June 30, 2025 - Introduction: Workload identity federation provides secure access to Azure resources from outside systems such as GitHub Actions, Azure DevOps, and Kubernetes without secret management.
🌐
Reddit
reddit.com › r/azure › federated workload identity: service principal vs managed idenity for github actions
r/AZURE on Reddit: Federated Workload Identity: Service Principal vs Managed Idenity for GitHub Actions
August 23, 2025 -

So, org is having me setup GitHub actions workflows for some new CI/CD stuff. Historically using ADO with Service Principal + client secret

I'm like cool. Clearly we'll use the azure/login action with OIDC. Most (all?) documentation concerning federated credentialsa and configuring this use managed identities Example

I spent about a day digging into how a UMI is just an abstraction over top a Service Principal and was like coolio, so unless I need client secrets or something, I'll just use UMI.

New guy joins and asks why not SP (he'd never used UMI before). I ask him to list differences as execise and then he starts to understand how the overlap was incredibly high and drops it. Decided to ask him to give it some more thought to see if he could make compelling case.....

Which brings me here:

The more I think about it, is there a case to use SPs for anything that supports federated credentials via UMI? Maybe I'm wrong but it seems clear that federated workload identies (as a concept) was made with Managed Identity in mind and added to SP after the fact.

It's a little weird to create a UMI unassigned to an Azure resource specifically for the purpose of GitHub (and eventually ADO) to use OIDC to reach an internal ACR and such. But it doesn't introduce any question on how auth is working, is right there next to all the other UMIs being used for other use cases, and I appreciate how it's a more limited resource (ie. no one will be accidently assigning secrets to it or something and forgetting about it)

Most research on the topic just repeats the adage of "use UMI for internal Azure resources and SP for external", but federated credentials clearly broke that paradigm over its knee and the documentation basically treats SPs as a legacy system best forgotten

edit:

also, when MSFT themselves have both their documentation and the portal UI all about quickly setting up UMI, I'm like "well clearly someone has a preference here"

🌐
GitHub
github.com › Azure › azure-workload-identity
GitHub - Azure/azure-workload-identity: Azure AD Workload Identity uses Kubernetes primitives to associate managed identities for Azure resources and identities in Azure Active Directory (AAD) with pods. · GitHub
Azure AD Workload Identity is the next iteration of Azure AD Pod Identity that enables Kubernetes applications to access Azure cloud resources securely with Azure Active Directory based on annotated service accounts.
Starred by 335 users
Forked by 108 users
Languages   Go 90.1% | Shell 4.7% | Makefile 3.7%
🌐
Ajtech
ajtech.nl › workload-identity-federation-with-github-actions
Azure Workload identity federation with GitHub Actions and user-managed identity | AJTech Blog
July 17, 2023 - Teams or organizations which are using GitHub Actions with Azure can use Workload identity federation to eliminate the use of credentials. How this works is quite easy. To access the Azure AD protected resources a service principal (App ...
🌐
GitHub
github.com › devopsshield › azure-devops-workload-identity-federation
GitHub - devopsshield/azure-devops-workload-identity-federation: Azure DevOps Workload Identity Federation - Updating your Azure DevOps ARM Service Connections to use the recommended Workload Identity Federation
Azure DevOps Workload Identity Federation - Updating your Azure DevOps ARM Service Connections to use the recommended Workload Identity Federation - devopsshield/azure-devops-workload-identity-fede...
Author   devopsshield
🌐
Medium
medium.com › @nicolasuter › github-action-with-azure-ad-workload-identity-federation-fb4e9d8bbf5c
GitHub Actions with Entra Workload Identity Federation | by Nicola | Medium
January 24, 2023 - Workload Identity Federation (let’s just call this WIF) allows app principals not residing within Azure to request short lived access tokens. This removes the need of storing client secrets or certificates within GitHub as Action secrets.
🌐
Mattias
mattias.engineer › blog › 2024 › azure-federated-credentials-github
Azure Federated Identity Credentials for GitHub · mattias.engineer
June 5, 2024 - Federated identity credentials is a new type of credential where you do not need to manage any credentials at all - somewhat unintuitive. The whole process is based on establishing a trust relationship between the external system and an app in Azure.