-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Limiting GCP Workload Identity Access to Specific Azure Sentinel Connectors #11251
Comments
Hi @ghanashvi, Thanks for flagging this issue, we will investigate this issue and get back to you with some updates. Thanks! |
Hi @v-rusraut and @v-sudkharat, Do you have any updates on the issue I raised? |
Hi @ghanashvi, Sorry for delay in response. |
Thank you for the response @v-sudkharat. From the GCP side, we are able to authenticate to the data connector. However, on the Azure side, we can create different GCP data connectors, and all of them will be able to authenticate to workload identity. Regarding documentation, in GCP there is no documentation for workload identity and Azure Sentinel authentication. However, there is documentation for Azure AD and GCP workload identity authentication. But configuring authentication between workload identity and Azure Sentinel data connection, we have to specify issuer and allowed audience, which is mentioned in the Microsoft documentation. We cannot use our account tenant ID and application ID in workload identity and Azure Sentinel data connector authentication, as it will result in an error if we use our own account ID. So, is there any way in Azure to restrict workload identity authentication to a specific GCP data connector or a specific Log Analytics workspace where we are configuring the data connector? |
Hi @ghanashvi, As of now there is not such doc or way we found to meet your request. But we will note it your query if we get any info on your request, we will share with you. |
I need to ingest GCP audit logs into Azure Sentinel using the GCP Pub/Sub audit log connector, with authentication handled through GCP Workload Identity. I have already set up the configuration, and it is working fine. In this setup, while configuring the provider issuer, one of the allowed audiences must match what is specified in the official Microsoft documentation. I have followed this configuration as required.
However, we now need to restrict authentication with the Workload Identity to only a specific data connector, ensuring that other connectors cannot authenticate. For example, if there are two connectors, only one should be allowed to authenticate, while the other should not.
I have not found a way to restrict the Workload Identity to a specific connector, which poses a security risk, as other GCP connectors could potentially authenticate using the same Workload Identity.
The text was updated successfully, but these errors were encountered: