Skip to content

Commit 02bc398

Browse files
Merge pull request #216251 from johnmarco/jm-ARO-lockbox
ARO Lockbox article
2 parents 9703ecd + ac3a883 commit 02bc398

File tree

2 files changed

+66
-0
lines changed

2 files changed

+66
-0
lines changed
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
---
2+
title: Using Azure Lockbox to authorize support access to Azure Red Hat OpenShift cluster resources.
3+
description: In this how-to article, learn how to use review support requests to access Azure Red Hat OpenShift cluster resources using Azure Lockbox.
4+
author: johnmarco
5+
ms.service: azure-redhat-openshift
6+
ms.topic: how-to
7+
ms.author: johnmarc
8+
ms.date: 03/23/2023
9+
topic: how-to
10+
keywords: azure, openshift, aro, red hat, lockbox
11+
#Customer intent: I need to learn how to authorize or reject requests from Microsoft support engineers to access my Azure Red Hat OpenShift cluster resources.
12+
---
13+
14+
# Authorize support requests for cluster access with Azure Lockbox
15+
16+
In some circumstances, a support agent at Microsoft may need access to your OpenShift cluster resources. The Azure Lockbox feature works with Azure Redhat OpenShift to provide customers a way to review and approve or reject requests from Microsoft support to access their cluster resources. This ability can be important for financial, government, or other regulatory industries where there's extra scrutiny regarding access to resources.
17+
18+
With Azure Lockbox, whenever a support ticket is created, you have the ability to grant consent to Microsoft support agents to access your cluster resources. The actions that the support engineer can take are limited to those [listed below](#aro-lockbox-actions). Azure Lockbox will tell you exactly what action the support agent is trying to execute.
19+
20+
See [Customer Lockbox](/azure/security/fundamentals/customer-lockbox-overview) for more information about the Lockbox feature.
21+
22+
## Access request process
23+
24+
The Azure Lockbox workflow consists of the following main steps:
25+
26+
1. A support ticket is opened from the Azure portal. The ticket is assigned to a customer support engineer at Microsoft.
27+
1. The customer support engineer reviews the request and determines the next steps to resolve the issue.
28+
1. When the request requires the support engineer to perform one of the actions [listed below](#aro-lockbox-actions), a Lockbox request is initiated. The request is now in a **Customer Notified** state, waiting for the customer's approval before granting access.
29+
1. An email is sent from Microsoft to the customer, notifying them about the pending access request.
30+
1. The customer signs in to the Azure portal to view the Lockbox request and can Approve or Deny the request.
31+
32+
As a result of the selection:
33+
34+
- Approve: Access is granted to the Microsoft support engineer. The access is granted for a default period of eight hours.
35+
- Deny: The elevated access request by the support engineer is rejected and no further action is taken.
36+
37+
See [Customer Lockbox--workflow](/azure/security/fundamentals/customer-lockbox-overview#workflow) for another details about the access request process.
38+
39+
## Operating limitations
40+
41+
- The Lockbox feature works only with customer support tickets.
42+
- Customers can only grant access through the Lockbox interface.
43+
- No action can be taken until customer approval is granted.
44+
45+
## Enable Lockbox for ARO
46+
47+
You can enable Lockbox from the [Administration module](https://aka.ms/customerlockbox/administration) in the Customer Lockbox blade. Once you enable Lockbox, it will apply to all the ARO clusters in that subscription.
48+
49+
> [!NOTE]
50+
> To enable Customer Lockbox, the user account needs to have the [Global Administrator role assigned](/azure/active-directory/roles/manage-roles-portal).
51+
52+
## ARO Lockbox actions
53+
54+
The actions below require Lockbox authorization in order for a support engineer to proceed:
55+
56+
- Create Kubernetes object
57+
- Update Kubernetes object
58+
- Delete Kubernetes object
59+
- Get logs from a pod in the OpenShift namespace
60+
- List or get Kubernetes objects
61+
62+
## Auditing logs
63+
64+
Lockbox logs are stored in activity logs. In the Azure portal, select Activity Logs to view auditing information related to Customer Lockbox requests. See [Customer Lockbox, Auditing Logs](/azure/security/fundamentals/customer-lockbox-overview#auditing-logs) for more information.

articles/openshift/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,8 @@
7777
href: howto-enable-fips-openshift.md
7878
- name: Enable Network Security Group flow logs
7979
href: howto-enable-nsg-flowlogs.md
80+
- name: Manage customer data access requests
81+
href: howto-use-lockbox.md
8082
- name: Use Azure Key Vault secrets
8183
href: howto-use-key-vault-secrets.md
8284
- name: Back up and restore

0 commit comments

Comments
 (0)