Azure authentication method with AZURE_FEDERATED_TOKEN_FILE

Hi, I’m running AKS and trying to integrate with Vault. I was able to create a federated token for my pod based on managed identity. Now I’m trying to utilize this token in my vault agent injector to log in to vault using the azure auth method. Here is how my annotations look like:

    vault.hashicorp.com/agent-inject: "true"
    vault.hashicorp.com/agent-init-first: "true"
    vault.hashicorp.com/namespace: "default"
    vault.hashicorp.com/role: "dev-role"
    vault.hashicorp.com/auth-path: "auth/azure"
    vault.hashicorp.com/auth-type: "azure"
    vault.hashicorp.com/log-level: "debug"
    vault.hashicorp.com/auth-config-resource: "api://AzureADTokenExchange"
    vault.hashicorp.com/auth-config-authenticate-from-environment: "true"

Unfortunately I’m getting an error:

  error=
  | Error making API request.
  | 
  | Namespace: default/
  | URL: PUT http://vault-ip:8200/v1/auth/azure/login
  | Code: 500. Errors:
  | 
  | * oidc: id token issued by a different provider, expected "https://sts.windows.net/tenant-id" got "https://login.microsoftonline.com/tenant-id/v2.0"