Skip to content

Commit 2a8271c

Browse files
committed
OSDOCS-3355: Adds RH Account Number to ROSA Roles and Policies
1 parent 7476817 commit 2a8271c

File tree

1 file changed

+7
-2
lines changed

1 file changed

+7
-2
lines changed

modules/rosa-sts-account-wide-roles-and-policies.adoc

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,11 @@ This section provides details about the account-wide IAM roles and policies that
99

1010
The account-wide roles and policies are specific to an OpenShift minor release version, for example OpenShift 4.8, and are backward compatible. You can minimize the required STS resources by reusing the account-wide roles and policies for multiple clusters of the same minor version, regardless of their patch version.
1111

12+
[NOTE]
13+
====
14+
The account number present in the `sts_installer_trust_policy.json` and `sts_support_trust_policy.json` samples represents the Red Hat account that is allowed to assume the required roles.
15+
====
16+
1217
.ROSA installer role, policy, and policy files
1318
[cols="1,2",options="header"]
1419
|===
@@ -35,7 +40,7 @@ The account-wide roles and policies are specific to an OpenShift minor release v
3540
"Effect": "Allow",
3641
"Principal": {
3742
"AWS": [
38-
"arn:aws:iam::%{aws_account_id}:role/RH-Managed-OpenShift-Installer"
43+
"arn:aws:iam::710019948333:role/RH-Managed-OpenShift-Installer"
3944
]
4045
},
4146
"Action": [
@@ -419,7 +424,7 @@ The account-wide roles and policies are specific to an OpenShift minor release v
419424
"Effect": "Allow",
420425
"Principal": {
421426
"AWS": [
422-
"arn:aws:iam::%{aws_account_id}:role/RH-Technical-Support-Access"
427+
"arn:aws:iam::710019948333:role/RH-Technical-Support-Access"
423428
]
424429
},
425430
"Action": [

0 commit comments

Comments
 (0)