Github OIDC with terraform and Azure

stevengonsalvez

Steven Gonsalvez

Posted on July 4, 2022

Github OIDC with terraform and Azure

Securing GitHub Actions with OIDC to create continuous infrastructure on Azure

Continuous deployment workflows can deploy and manage lifecycle of cloud infrastructure on Azure, AWS, GCP etc. To do this, workflows would need to authenticate itself against the cloud provider using credentials that can be accessed from GitHub Secrets or an external vault appropriately. GitHub OIDC with cloud providers is now available to use, without the complication of credential management.

Using OIDC for terraform-azure with GitHub actions for continuous infrastructure.

So what was the approach prior to OIDC in terraform or availability of OIDC in GitHub actions.

The ways to do CI/CD for terraform infrastructure involved

  • Using a managed identity, which mean't that you needed some "infrastructure" component in azure (pre-existing) to have a managed identity, to deploy and manage continuously other infrastructure. So that would involve

    • Some pre-existing (VM or containers (Kube or other))
    • For VMs/Containers, those could be used as runners for the terraform setup (from any CI tooling) or some script/orchestrator to execute (on pre-existing VMs. e.g.: ansible or even make, or we could overengineer some terraform to do terraform)
  • Using a service principal and a relatively "static" password/certificate. The credentials will need to be stored in a "vault" or in the case of GitHub actions (GitHub secrets), and present that as part of the job.

Both these approaches have its frailties and complexities. Either it involves complicated orchestration, more footprint management than is needed and more code/configuration than is intended. The latter, well - straightforward is either long-lived credentials, or some overengineered secret management capability which will always have attack vectors - due to the considerably vulnerable nature of a static generated key

Federated OIDC solves both these problems, making it secure and much less fragile.
(e.g.: short-lived tokens, granular access, no additional wrap or orchestration.)
If you are new to OIDC, start with these illustrations

A new solution of using passwordless service principal with OIDC to use short-lived tokens with "sort of" federated identity between cloud provider identity and GitHub actions (as an identity provider)

In the case of GitHub Actions, GitHub is used as a federated identity provider with a cloud identity provider (for azure, AD). The identity object itself is facets of the workflow (environment, pull-request, branch, tag)

A TLDR view of how federated workload identity works between GitHub action and azure.

GitHub-oidc

How it works.

To demonstrate the working, will be using Terraform to provision infrastructure on Azure.

So there are three items in here.

  • The Service Principal setup itself (the service principal that is used to run terraform to provision)
  • Terraform configuration for OIDC
  • GitHub Actions and GitHub Secrets.

The service principal

  • The service principal will need to have the relevant role's (that is required) e.g.: contributor to provision, as foremost.
  • Need to create an azure ad federated credential on the service principal, with the subject identifier(s) of whatever is relevant for the pipeline (e.g.: pull-request, branch, environment or tag)

Creating a service principal with terraform and assigning contributor access to the subscription

The API permissions needed to create this credential (either with manually as a user or if using another service principal to create this service principal)

  • Application.readwrite.All
  • User.read.All (This is required to look up user's object_id to assign it as owner of Service Principal)
  • Group.read.All (This is required to look up Group's object_id to assign it as owner of Service Principal)
terraform {
  required_providers {
    azurerm = {
      source  = "hashicorp/azurerm"
      version = ">= 3.9.0"
    }
    azuread = {
      source  = "hashicorp/azuread"
      version = ">= 2.22.0"
    }
  }
}

provider "azurerm" {
  features {}
}


data "azurerm_subscription" "this" {
}

locals {
  scope    = data.azurerm_subscription.this.id
  app_name = "tf-oidc-test-sample"
}

data "azuread_client_config" "current" {}

data "azuread_user" "this" {
  user_principal_name = var.owner
}

resource "azuread_application" "this" {
  display_name = local.app_name
  web {
    implicit_grant {
      access_token_issuance_enabled = true
    }
  }
  owners = [data.azuread_client_config.current.object_id, data.azuread_user.this.object_id]
}

resource "azuread_service_principal" "this" {
  application_id               = azuread_application.this.application_id
  app_role_assignment_required = false
  lifecycle {
    prevent_destroy = false
  }
}

resource "azuread_application_password" "this" {
  application_object_id = azuread_application.this.id
  display_name          = "tf-credentials"
  end_date              = "2099-01-01T01:02:03Z"
}


resource "azurerm_role_assignment" "sub-contributor" {
  scope                = local.scope
  role_definition_name = "Contributor"
  principal_id         = azuread_service_principal.this.id
  // If new SP there  may be replciation lag this disables validation
  skip_service_principal_aad_check = true
  lifecycle {
    ignore_changes = [
      scope,
    ]
  }
}
Enter fullscreen mode Exit fullscreen mode

Create a federated credential on the Service principal

The API permissions needed to create this credential (either with manually as a user or if using another service principal to create this service principal)

  • Application.readwrite.ownedby (or all)
resource "azuread_application_federated_identity_credential" "main" {
  application_object_id = azuread_application.this.id
  display_name          = "az-oidc-branch-main"
  description           = "deployments for repository cloud-cicd-exploration"
  audiences             = ["api://AzureADTokenExchange"]
  issuer                = "https://token.actions.githubusercontent.com"
  subject               = "repo:stevengonsalvez/cloud-cicd-exploration:ref:refs/heads/main"
}

resource "azuread_application_federated_identity_credential" "pr" {
  application_object_id = azuread_application.this.id
  display_name          = "az-oidc-pr"
  description           = "deployments for repository cloud-cicd-exploration"
  audiences             = ["api://AzureADTokenExchange"]
  issuer                = "https://token.actions.githubusercontent.com"
  subject               = "repo:stevengonsalvez/cloud-cicd-exploration:pull_request"
}

resource "azuread_application_federated_identity_credential" "env-prod" {
  application_object_id = azuread_application.this.id
  display_name          = "az-oidc-env-prod"
  description           = "deployments for repository cloud-cicd-exploration"
  audiences             = ["api://AzureADTokenExchange"]
  issuer                = "https://token.actions.githubusercontent.com"
  subject               = "repo:stevengonsalvez/cloud-cicd-exploration::environment:production"
}
Enter fullscreen mode Exit fullscreen mode

The above example creates one federated credential for each of

  • environment: environment is production on the job.
  • pull request: Any job executing on the pull request event
  • main branch: Any job executing on a push to the main branch

The order of precedence is as above. e.g.:

When used in GitHub actions, GitHub's workflows create a JWT with relevant claims that are passed back to the cloud identity provider to be validated against the assertions(subject identifier) set up in the Federated cred

For the following workflow, although the trigger event is a pull-request, the claims in the JWT sent back from the job plan-rg will be the environment Nonprod. Therefore, the service principal will need to have a federated credential that contains the subject identifier as such repo:<owner>/<repository>:environment:Nonprod

Note: Also this is case-sensitive

The JWT will look something like the below (refer to sub claim in jwt) - when executed on the repository

{
  "typ": "JWT",
  "alg": "RS256",
  "x5t": "example-thumbprint",
  "kid": "example-key-id"
}
{
  "jti": "some-id",
  "sub": "repo:stevengonsalvez/cloud-cicd-exploration:environment:Nonprod",
  "environment": "prod",
  "aud": "https://github.com/stevengonsalvez",
  "ref": "refs/heads/branch",
  "sha": "example-sha",
  ... bunch of other stuff
}
Enter fullscreen mode Exit fullscreen mode
name: az-oidc-test

on:
  pull_request:
    branches:
      - master

permissions:
  id-token: write
  contents: read
  pull-requests: write
  issues: write
  statuses: write


# subject on oidc : pullrequest or environment:
# if environment specified on job (pull request) does not work
jobs:
  plan-rg:
    runs-on: ubuntu-latest
    name: plan rg
    environment:
      name: Nonprod
    env:
      ARM_SUBSCRIPTION_ID: ${{ secrets.SUBSCRIPTION_ID }}
      ARM_CLIENT_ID: ${{ secrets.SP_CLIENT_ID }}
      ARM_TENANT_ID: ${{ secrets.TENANT_ID }}
      LAYER_NAME: resource-group
    steps:
      - name: Checkout
        uses: actions/checkout@v3
      - name: debug
        run: |
          echo "$GITHUB_CONTEXT"
          env
          echo ${ACTIONS_ID_TOKEN_REQUEST_URL}
          echo ${ACTIONS_ID_TOKEN_REQUEST_TOKEN}
Enter fullscreen mode Exit fullscreen mode

Terraform configuration

The terraform configuration is straightfoward. Terraform providers inherently use these helpers which now has integrated with oidc. See here.

The detail of configuring azurerm provider in terraform to use oidc is here.

The short TLDR version of using OIDC with GitHub actions is simple.

  • Either in provider section of terraform, specify use_oidc as below. Refer example
provider "azurerm" {
  use_oidc = true
  features {}
}
Enter fullscreen mode Exit fullscreen mode
  • Or set the environment variable ARM_USE_OIDC=true

For GitHub Actions there is no need to specify the ID_URL and ID_token, as that seems to be integrated into the azurerm provider (Although, it is strange the decision to couple terraform provider with a particular CI/CD tool)

Note: If using az cli outside the context of terraform as a separate step in GitHub actions job or as a local-exec in terraform, that would need to be authenticated using OIDC with the azure/login action

GitHub Actions configuration

The only setting needed for GitHub actions to be able to authenticate with the cloud provider is permissions either at job or workflow.

permissions:
  id-token: write
Enter fullscreen mode Exit fullscreen mode

For a working terraform/actions example:

How to GitOps the whole setup

For any organisation with lots of apps and repositories, each repository will need to have a service principal with access to an appropriate subscription (whatever subscription strategy is employed)

Note: It is strongly advised not to share the same service primary as part of least-privilege.

Consider 50+ repositories, each with its own terraform assembly of modules (or a dependency injection style execution - covered in another post), that require a service principal to install and administer azure cloud infrastructure.

A manual approach for creating service principals and managing lifecycle (revoking, permissions etc.), will significantly reduce flow and the goal would be to automate the mechanism. Treat it like a vending machine, issuing the appropriate access when provided with the appropriate identity via a GitOps setup (completely code managed and requests/changes via a pull request, automated via GitHub's actions workflows).

The following is a detail of a GitOps setup requesting service principals for a repository

image

A mock request pull request to the service principal provisioner would be of form (in a request_1.tfvar)

owners = { users=[user.name@organisation.com], groups=[group@organisation.com] } # owners of the service principal
app_name = test-oidc-demo #name of the service principal
subscriptions = [ subscription1, subscription2 ] #subscriptions that this SP requires access to
federated_credentials_env = [ nonprod, prod, stage ] #environments that are used in github workflow jobs.
Enter fullscreen mode Exit fullscreen mode

A working example here

This would generate service principals, that can be injected into a vault or into a GitHub secrets. Only the application_id of the service principal is needed. No passwords are generated. So this can be directly injected into configuration if need be.

e.g.: injecting into GitHub secrets

resource "github_actions_environment_secret" "client_id" {
  repository  = "repo_name"
  environment = "environment_name"
  secret_name     = "ARM_CLIENT_ID"
  plaintext_value = module.service_principal.id # or whatever is the reference appropriately.
}
Enter fullscreen mode Exit fullscreen mode

API Permissions needed for the Azure Vending machine Service Principal

  • Application.readwrite.all
  • User.read.All

There is one issue with the above setup to iron out

  • The Azure Vending machine is now having environment related configuration for the target application, which makes it coupled with its lifecycle (e.g.: environment name change in workflows from stage to pre-prod, will need a change from the vending machine to re-issue credentials)

One solution would be

  • Make the target application Service principal that is created an owner for itself
  • Assign Application.readwrite.ownedby access to the service principal
  • The terraform portion of generating federated credentials can then be generated as part of bootstrap in the pipeline of that repository.

Consequently, all environment lifecycle related parts of service principal is maintained locally with the application configuration - as detailed.

image

Permissions required for the Azure Vending Machine service principal

  • Application.readwrite.All (API permissions)
  • User.read.All (API permissions)
  • Global Administrator or Privileged Role Administrator to grant API permissions to service principals

Appendix

Working examples in CICD-exploration repository

💖 💪 🙅 🚩
stevengonsalvez
Steven Gonsalvez

Posted on July 4, 2022

Join Our Newsletter. No Spam, Only the good stuff.

Sign up to receive the latest update from our blog.

Related