Hello Hering, Martin
Thank you for posting your question in the Microsoft Q&A forum.
To enable Flux to authenticate to Azure RBAC-enabled spoke clusters without local_user, Microsoft recommends using Azure Workload Identity a fully supported solution that aligns with zero-trust principles. By configuring Flux with a managed identity federated to Azure AD, the hub cluster can securely access spokes via short-lived tokens, eliminating static credentials. This approach requires annotating Flux’s service account with the managed identity’s client ID and granting it Azure Kubernetes Service Cluster User Role on spoke clusters. Alternatively, Cluster API (CAPZ) or Azure Arc can orchestrate multi-cluster management while maintaining Azure AD authentication. Both methods ensure compliance with security constraints, as they bypass local_user entirely. For production environments, this architecture is Microsoft-validated, provided spoke clusters run Kubernetes v1.22+.
If the above answer helped, please do not forget to "Accept Answer" as this may help other community members to refer the info if facing a similar issue. Your contribution to the Microsoft Q&A community is highly appreciated.