You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: authentication/managing_cloud_provider_credentials/about-cloud-credential-operator.adoc
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,11 +19,9 @@ By setting different values for the `credentialsMode` parameter in the `install-
19
19
20
20
* **xref:../../authentication/managing_cloud_provider_credentials/cco-mode-passthrough.adoc#cco-mode-passthrough[Passthrough]**: In passthrough mode, the CCO passes the provided cloud credential to the components that request cloud credentials.
21
21
22
-
* **xref:../../authentication/managing_cloud_provider_credentials/cco-mode-manual.adoc#cco-mode-manual[Manual]**: In manual mode, a user manages cloud credentials instead of the CCO.
22
+
* **xref:../../authentication/managing_cloud_provider_credentials/cco-mode-manual.adoc#cco-mode-manual[Manual mode with long-term credentials for components]**: In manual mode, you can manage long-term cloud credentials instead of the CCO.
23
23
24
-
** **xref:../../authentication/managing_cloud_provider_credentials/cco-mode-sts.adoc#cco-mode-sts[Manual with AWS Security Token Service]**: In manual mode, you can configure an AWS cluster to use Amazon Web Services Security Token Service (AWS STS). With this configuration, the CCO uses temporary credentials for different components.
25
-
26
-
** **xref:../../authentication/managing_cloud_provider_credentials/cco-mode-gcp-workload-identity.adoc#cco-mode-gcp-workload-identity[Manual with GCP Workload Identity]**: In manual mode, you can configure a GCP cluster to use GCP Workload Identity. With this configuration, the CCO uses temporary credentials for different components.
24
+
* **xref:../../authentication/managing_cloud_provider_credentials/cco-short-term-creds.adoc#cco-short-term-creds[Manual mode with short-term credentials for components]**: For some providers, you can use the CCO utility (`ccoctl`) during installation to implement short-term credentials for individual components. These credentials are created and managed outside the {product-title} cluster.
27
25
28
26
.CCO mode support matrix
29
27
[cols="<.^2,^.^1,^.^1,^.^1"]
@@ -38,18 +36,18 @@ By setting different values for the `credentialsMode` parameter in the `install-
38
36
|Amazon Web Services (AWS)
39
37
|X
40
38
|X
41
-
|X
39
+
|X ^[1]^
42
40
43
41
44
42
|Microsoft Azure
45
43
|
46
-
|X ^[1]^
44
+
|X ^[2]^
47
45
|X
48
46
49
47
|Google Cloud Platform (GCP)
50
48
|X
51
49
|X
52
-
|X
50
+
|X ^[3]^
53
51
54
52
|IBM Cloud
55
53
|
@@ -74,7 +72,9 @@ By setting different values for the `credentialsMode` parameter in the `install-
74
72
|====
75
73
[.small]
76
74
--
77
-
1. Manual mode is the only supported CCO configuration for Microsoft Azure Stack Hub.
75
+
1. Short-term credentials with AWS Security Token Service can be configured during installation.
76
+
2. Manual mode with long-term credentials is the only supported CCO configuration for Microsoft Azure Stack Hub.
77
+
3. Short-term credentials with GCP Workload Identity can be configured during installation.
78
78
--
79
79
80
80
[id="cco-determine-mode_{context}"]
@@ -97,11 +97,11 @@ For platforms on which multiple modes are supported (AWS, Azure, and GCP), when
97
97
98
98
By default, the CCO determines whether the credentials are sufficient for mint mode, which is the preferred mode of operation, and uses those credentials to create appropriate credentials for components in the cluster. If the credentials are not sufficient for mint mode, it determines whether they are sufficient for passthrough mode. If the credentials are not sufficient for passthrough mode, the CCO cannot adequately process `CredentialsRequest` CRs.
99
99
100
-
If the provided credentials are determined to be insufficient during installation, the installation fails. For AWS, the installer fails early in the process and indicates which required permissions are missing. Other providers might not provide specific information about the cause of the error until errors are encountered.
100
+
If the provided credentials are determined to be insufficient during installation, the installation fails. For AWS, the installation program fails early in the process and indicates which required permissions are missing. Other providers might not provide specific information about the cause of the error until errors are encountered.
101
101
102
102
If the credentials are changed after a successful installation and the CCO determines that the new credentials are insufficient, the CCO puts conditions on any new `CredentialsRequest` CRs to indicate that it cannot process them because of the insufficient credentials.
103
103
104
-
To resolve insufficient credentials issues, provide a credential with sufficient permissions. If an error occurred during installation, try installing again. For issues with new `CredentialsRequest` CRs, wait for the CCO to try to process the CR again. As an alternative, you can manually create IAM for xref:../../installing/installing_aws/manually-creating-iam.adoc#manually-creating-iam-aws[AWS], xref:../../installing/installing_azure/manually-creating-iam-azure.adoc#manually-creating-iam-azure[Azure], and xref:../../installing/installing_gcp/manually-creating-iam-gcp.adoc#manually-creating-iam-gcp[GCP].
104
+
To resolve insufficient credentials issues, provide a credential with sufficient permissions. If an error occurred during installation, try installing again. For issues with new `CredentialsRequest` CRs, wait for the CCO to try to process the CR again. As an alternative, you can configure your cluster to use a different CCO mode that is supported for your cloud provider.
0 commit comments