Skip to content

Commit d0c2bbc

Browse files
committed
SME edits
1 parent eeb741e commit d0c2bbc

File tree

1 file changed

+20
-34
lines changed

1 file changed

+20
-34
lines changed

articles/openshift/howto-use-lockbox.md

Lines changed: 20 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,37 +1,37 @@
11
---
2-
title: Using Azure Lockbox to manage customer data access
3-
description: In this how-to article, learn how to use Azure Lockbox to review customer data access requests for Azure Red Hat Openshift.
2+
title: Using Azure Lockbox to authorize support access to Azure Red Hat OpenShift cluster resources.
3+
description: In this how-to article, learn how to use Azure Lockbox to review support requests to access Azure Red Hat OpenShift cluster resources.
44
author: johnmarco
55
ms.service: azure-redhat-openshift
66
ms.topic: how-to
77
ms.author: johnmarc
8-
ms.date: 10/26/2022
8+
ms.date: 11/11/2022
99
topic: how-to
1010
keywords: azure, openshift, aro, red hat, lockbox
11-
#Customer intent: I need to learn how to manage customer data requests for my Azure Red Hat Openshift installation.
11+
#Customer intent: I need to learn how to authorize or reject requests from Microsoft support engineers to access my Azure Red Hat OpenShift cluster resources.
1212
---
1313

14-
# Manage customer data requests with Azure Lockbox
14+
# Authorize support requests for cluster access with Azure Lockbox
1515

16-
In some circumstances, a support agent at Microsoft or Red Hat may need access to a customer’s OpenShift clusters and Azure environment. The Azure Lockbox feature works with Azure Redhat OpenShift to provide customers a way to review and approve/reject customer data access requests. This ability can be particularly important for financial, government, or other regulatory industries where there is extra scrutiny regarding access to customer data.
16+
In some circumstances, a support agent at Microsoft may need access to your OpenShift cluster resources. The Azure Lockbox feature works with Azure Redhat OpenShift to provide customers a way to review and approve/reject requests from Microsoft support to access their cluster resources. This ability can be particularly important for financial, government, or other regulatory industries where there is extra scrutiny regarding access to resources.
1717

18-
With Azure Lockbox, whenever a support ticket is created, you have the ability to grant consent to Microsoft and Red Hat support agents to access your environment to troubleshoot and resolve issues. Azure Lockbox will tell you exactly what support agents are trying to access to help resolve your issues.
18+
With Azure Lockbox, whenever a support ticket is created, you have the ability to grant consent to Microsoft support agents to access your cluster resources. The actions that the support engineer can take are limited to those [listed below](#aro-lockbox-actions). Azure Lockbox will tell you exactly what action the support agent is trying to execute.
1919

20-
See [Customer Lockbox](/azure/security/fundamentals/customer-lockbox-overview) for more information and instruction on the Lockbox feature.
20+
See [Customer Lockbox](/azure/security/fundamentals/customer-lockbox-overview) for more information about the Lockbox feature.
2121

2222
## Access request process
2323

2424
1. The Azure Lockbox workflow consists of the following main steps:
25-
1. A support ticket is opened from the Azure portal. The ticket is assigned to a customer support engineer at Microsoft or Red Hat.
26-
1. The customer support engineer review the service request and determines the next steps to resolve the issue.
27-
1. When the request requires direct access to customer data, a Customer Lockbox request is initiated. The request is now in a **Customer Notified** state, waiting for the customer's approval before granting access.
25+
1. A support ticket is opened from the Azure portal. The ticket is assigned to a customer support engineer at Microsoft.
26+
1. The customer support engineer reviews the request and determines the next steps to resolve the issue.
27+
1. When the request requires direct access to cluster resources, a Customer Lockbox request is initiated. The request is now in a **Customer Notified** state, waiting for the customer's approval before granting access.
2828
1. An email is sent from Microsoft to the customer, notifying them about the pending access request.
2929
1. The customer signs in to the Azure portal to view the Lockbox request and can Approve or Deny the request.
3030

3131
As a result of the selection:
3232

33-
- Approve: Access is granted to the Microsoft engineer. The access is granted for a default period of eight hours.
34-
- Deny: The elevated access request by the Microsoft engineer is rejected and no further action is taken.
33+
- Approve: Access is granted to the Microsoft support engineer. The access is granted for a default period of eight hours.
34+
- Deny: The elevated access request by the support engineer is rejected and no further action is taken.
3535

3636
See [Customer Lockbox--workflow](/azure/security/fundamentals/customer-lockbox-overview#workflow) for additional details about the access request process.
3737

@@ -40,7 +40,6 @@ See [Customer Lockbox--workflow](/azure/security/fundamentals/customer-lockbox-o
4040
- The Lockbox feature works only with customer support tickets.
4141
- Customers can only grant access through the Lockbox interface.
4242
- No action can be taken until customer approval is granted.
43-
- Lockbox cannot be intergrated with Kusto/Azure Data Explorer.
4443

4544
## Enable Lockbox for ARO
4645

@@ -51,26 +50,13 @@ You can enable Customer Lockbox from the [Administration module](https://aka.ms/
5150
5251
## ARO Lockbox actions
5352

54-
The tables below list typical actions and whether or not they require Lockbox:
55-
56-
|ARO Action |Not Required Behind Lockbox |Lockbox Required |
57-
|------------|-----------------------------|------------------|
58-
|Create Kubernetes object | |X |
59-
|Update Kubernetes object | |X |
60-
|Delete Kubernetes object |X(softer delete does not require Lockbox) |X(VM or VMSS or Storage Account may require Lockbox) |
61-
|Get cluster |X (only service metadata)<br>No need behind Lockbox | |
62-
|Get VM serial console logs | |X |
63-
|List cluster Azure resources |X (ARM or above) | |
64-
|List clusters |X (ARM or above) | |
65-
|List or get Kubernetes objects | |X (Below ARM/Created by customers) |
66-
|Put or patch cluster |X | |
67-
|Redeploy virtual machine |X | |
68-
|Upgrade cluster |X | |
69-
70-
|Kubectl Commmand |Not Required Behind Lockbox |Lockbox Required |
71-
|------------|-----------------------------|------------------|
72-
|Top node | |X (do not return body of pods) |
73-
|Top pods | |X (do not return body of pods) |
53+
The actions below require Lockbox authorization in order for a support engineer to proceed:
54+
55+
- Create Kubernetes object
56+
- Update Kubernetes object
57+
- Delete Kubernetes object
58+
- Get logs from an OpenShift pod
59+
- List or get Kubernetes objects
7460

7561
## Auditing logs
7662

0 commit comments

Comments
 (0)