Connect your services to external cloud resources like AWS IAM roles, Azure managed identities, Google Cloud SQL instances, and persistent disks.Documentation Index
Fetch the complete documentation index at: https://porter-docs-azure-managed-identity-ga.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Connection Types
| Type | Description | Cloud Provider |
|---|---|---|
awsRole | Attach an IAM role for AWS API access | AWS |
azureManagedIdentity | Bind a User Assigned Managed Identity for Azure API access | Azure |
cloudSql | Connect to Google Cloud SQL instances | GCP |
disk | Attach persistent storage | All |
AWS Role Connection
Attach an IAM role to your service for secure AWS API access without managing credentials.Field Reference
| Field | Type | Required | Description |
|---|---|---|---|
type | string | Yes | Must be awsRole |
role | string | Yes | IAM role name |
Example
Azure Managed Identity Connection
Bind a User Assigned Managed Identity (UAMI) to your service for secure Azure API access without managing credentials. Porter uses Azure Workload Identity to federate the service’s Kubernetes service account with the UAMI, so your application can authenticate to Azure resources usingDefaultAzureCredential (or any credential type that supports workload identity).
This connection is available on any project with an AKS cluster created through Porter.
Prerequisites
Before adding this connection to your service, you must:- Have a User Assigned Managed Identity provisioned in your Azure subscription. Porter does not create the UAMI for you — provision it via the Azure Portal, Terraform, or the Azure CLI.
- Grant the UAMI the Azure RBAC role assignments it needs to access the resources your service will call (e.g.
Storage Blob Data Readeron a storage account).
Field Reference
| Field | Type | Required | Description |
|---|---|---|---|
type | string | Yes | Must be azureManagedIdentity |
identityName | string | Yes | Name of the User Assigned Managed Identity |
resourceGroup | string | Yes | Azure resource group containing the managed identity |
Example
Only one
azureManagedIdentity connection is permitted per service. If you need to access resources across multiple identities, consolidate role assignments onto a single UAMI.Cloud SQL Connection (GCP)
Connect to Google Cloud SQL instances using the Cloud SQL Auth Proxy for secure database access.Your GCP Service account must be configured in the Connections tab of your cluster settings before it can be used in
porter.yaml.Field Reference
| Field | Type | Required | Description |
|---|---|---|---|
type | string | Yes | Must be cloudSql |
config.cloudSqlConnectionName | string | Yes | Cloud SQL instance connection name |
config.cloudSqlDatabasePort | integer | Yes | Database port (e.g., 5432 for PostgreSQL) |
config.cloudSqlServiceAccount | string | Yes | GCP service account name |
Example
The connection name follows the format
project-id:region:instance-name. You can find this in the Google Cloud Console under your Cloud SQL instance details.Persistent Disk Connection
Attach persistent storage to your service for data that needs to survive pod restarts.Your persistent disk must be created in the Add-Ons tab of Porter before it can be used in
porter.yaml.Field Reference
| Field | Type | Required | Description |
|---|---|---|---|
type | string | Yes | Must be disk |
config.diskName | string | Yes | Name of the persistent disk |
Example
Multiple Connections
You can attach multiple connections to a single service (but only one of each type of connection):Related Documentation
- Web Services - Web service configuration
- Worker Services - Worker service configuration
- Job Services - Job service configuration
- porter.yaml Reference - Complete configuration reference

