Operator Authentication¶
Azure Local Ranger is multi-target and multi-credential by design. Operators should think about authentication as a credential map, not as a single login.
Target Credential Map¶
| Target | Typical credential |
|---|---|
| Azure | existing Az context, interactive login, service principal, or managed identity |
| Cluster nodes | domain credential or local administrator credential for WinRM |
| Active Directory | domain credential with read access |
| BMC / iDRAC | local BMC credential |
| Future switch or firewall targets | vendor-specific API, SSH, or SNMP credential |
A valid Azure login does not imply valid WinRM access. A valid cluster credential does not imply BMC access.
Domain-To-Credential Routing¶
Operators should expect Ranger to route credentials according to the domains being run.
| Domain area | Required credential posture |
|---|---|
| Cluster, storage, networking, virtual machines, management tools, performance | Cluster WinRM credential |
| Identity and security | Cluster WinRM credential and, when AD discovery is needed, domain read credential |
| Azure integration and Azure-side monitoring or policy overlays | Azure credential |
| Hardware and OEM integration | BMC / Redfish credential |
| Future switch or firewall interrogation | Device-specific credential supplied explicitly by the operator |
If a domain can run with one credential and enrich with another, Ranger should run the base domain first and mark the enrichment layer partial or skipped when the supporting credential is absent.
Credential Resolution Order¶
Ranger should resolve credentials in this order:
- explicit parameter input
- Key Vault reference in configuration
- interactive prompt
That order keeps automation possible while still allowing ad-hoc use.
Azure Authentication Options¶
Azure-side discovery should support:
- existing authenticated Az context
Connect-AzAccountinteractive login- service principal with client secret or certificate
- managed identity for Azure-hosted execution environments
The right option depends on whether the run is interactive, scheduled, or hosted inside Azure.
Key Vault References¶
The documented secret reference format is:
Examples:
keyvault://kv-ranger/cluster-read
keyvault://kv-ranger/idrac-root
keyvault://kv-ranger/azure-sp-client-secret
Ranger should resolve these through Az.KeyVault first and fall back to Azure CLI if required.
If the secret reference includes a version, Ranger should resolve that exact version. If the version is omitted, Ranger should resolve the latest enabled version.
If Key Vault resolution fails:
- required core domains should fail clearly when prompting is disabled
- optional domains should be skipped with a reason when prompting is disabled
- interactive runs may prompt for replacement credentials when prompting is enabled
Local Identity with Azure Key Vault¶
In the Azure Local local-identity model, Key Vault is not just an operator convenience. It is part of the Azure Local operating model.
Current Microsoft documentation describes:
- one Key Vault per cluster for backup secrets
- managed identity access to Key Vault for secret backup and retrieval
- Key Vault Secrets Officer role assignment requirements
ADAware = 2for a local-identity cluster- RecoveryAdmin recovery-secret handling through Key Vault
That means Ranger should both use Key Vault for its own secret resolution patterns and document the cluster’s Key Vault posture when that variant is detected.
Security Guidance¶
Operators should avoid:
- storing plaintext secrets in committed config files
- reusing highly privileged credentials unnecessarily across all target types
- assuming optional domains are harmless to enable without confirming network and credential scope
A read-only product still handles sensitive credentials and should be operated accordingly.
Expected Prompts¶
If a required credential is missing and prompting is enabled, Ranger should prompt with a clear label such as:
- Azure subscription access credential
- Cluster WinRM credential
- Active Directory read credential
- Dell iDRAC credential
Prompts should identify the target and the reason the credential is needed.