{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Programming Tech Brief By HackerNoon","title":"Secure Pod Identity Across Clouds: AKS Workload Identity, EKS IRSA, GKE Workload Identity","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/7c60edb5\"></iframe>","width":"100%","height":180,"duration":562,"description":"\n        This story was originally published on HackerNoon at: https://hackernoon.com/secure-pod-identity-across-clouds-aks-workload-identity-eks-irsa-gke-workload-identity.\n             Projected service account tokens bring expiration, rotation, and audience binding to Kubernetes pod auth. \n            Check more stories related to programming at: https://hackernoon.com/c/programming.\n            You can also check exclusive content about #kubernetes, #eks, #aks, #gke, #cloud, #credentials, #service-account-token-rotation, #projected-service-account,  and more.\n            \n            \n            This story was written by: @pjajoo. Learn more about this writer by checking @pjajoo's about page,\n            and for more stories, please visit hackernoon.com.\n            \n                \n                \n                Learn how Kubernetes projected service account tokens replace legacy secret-mounted tokens with short-lived, audience-scoped JWTs—plus how AKS, EKS (IRSA), and GKE use them for workload identity.\n        \n        ","thumbnail_url":"https://img.transistorcdn.com/KhCapPSRkLGL2Xw8888yuChkNRWthaKapLYTvNdu4W4/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzQxMTY2LzE2ODM1/ODIzMzAtYXJ0d29y/ay5qcGc.webp","thumbnail_width":300,"thumbnail_height":300}