You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ccs-gcp-iam.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ The `sd-sre-platform-gcp-access` Google group is granted access to the GCP proje
70
70
71
71
[NOTE]
72
72
====
73
-
* For information regarding the roles within the `sd-sre-platform-gcp-access` group that are specific to clusters created when using the Workload Identity Federation (WIF) authentication type, see link:https://github.com/openshift/managed-cluster-config/blob/master/resources/wif/4.17/vanilla.yaml[managed-cluster-config].
73
+
* For information regarding the roles within the `sd-sre-platform-gcp-access` group that are specific to clusters created when using the Workload Identity Federation (WIF) authentication type, see link:https://github.com/openshift/managed-cluster-config/blob/master/resources/wif/4.19/vanilla.yaml[managed-cluster-config].
74
74
* For information about creating a cluster using the Workload Identity Federation authentication type, see _Additional resources_.
For further details about WIF configuration roles and their assigned permissions, see link:https://github.com/openshift/managed-cluster-config/blob/master/resources/wif/4.18/vanilla.yaml[managed-cluster-config].
158
+
For the complete list of WIF configuration roles and their assigned permissions, see link:https://github.com/openshift/managed-cluster-config/blob/master/resources/wif/4.19/vanilla.yaml[managed-cluster-config].
156
159
157
160
[id="create-wif-cluster_{context}"]
158
161
== Creating a WIF cluster
@@ -246,8 +249,32 @@ Updating a WIF configuration is only applicable for y-stream updates. For an ove
246
249
====
247
250
Before upgrading a WIF-enabled {product-title} cluster to a newer version, you must update the wif-config to that version as well. If you do not update the wif-config version before attempting to upgrade the cluster version, the cluster version upgrade will fail.
248
251
249
-
You can update a wif-config to a specific {product-title} version by running the following command:
252
+
As part of Red{nbsp}Hat's ongoing commitment to the principle of least privilege, certain permissions previously assigned to the `osd-deployer` service account in WIF configurations have been removed. These changes help enhance the security of your clusters by ensuring that service accounts have only the permissions they need to perform their functions.
253
+
254
+
For the complete list of WIF configuration roles and their assigned permissions, see link:https://github.com/openshift/managed-cluster-config/blob/master/resources/wif/4.19/vanilla.yaml[managed-cluster-config].
255
+
256
+
To align your existing WIF configurations with these updated permissions, you can run the `ocm gcp update wif-config` command. This command updates the WIF configuration to include the latest permissions and roles required for optimal operation.
257
+
258
+
When you update a wif-config or create a new one, ensure your {cluster-manager} CLI (`ocm`) is up to date. Not updating to the latest version of the `ocm` can result in error messages and service disruptions.
250
259
260
+
.Example output
261
+
[source,text]
262
+
----
263
+
Error: failed to create wif-config: failed to create wif-config: status is 400, identifier is '400', code is 'CLUSTERS-MGMT-400', at '2025-10-06T15:18:37Z' and operation identifier is 'f9551d63-a58a-4e3c-b847-5f99ba1b0b74': Client version is out of date for WIF operations. Please update from vOCM-CLI/1.0.7 to v1.0.8 and try again.
264
+
----
265
+
266
+
.Procedure
267
+
. To check the version of your `ocm`, run the following command:
268
+
+
269
+
[source,terminal]
270
+
----
271
+
$ ocm version
272
+
----
273
+
+
274
+
. Optional: If your `ocm` version is not the latest available, download and install the latest version from the link:https://console.redhat.com/openshift/downloads[Downloads] page on {cluster-manager}.
275
+
+
276
+
. Update a wif-config to a specific {product-title} version by running the following command:
<1> Replace `<wif_name>` with the name of the WIF configuration you want to update.
257
284
<2> Optional: Replace `<version>` with the {product-title} y-stream version you plan to update the cluster to. If you do not specify a version, the wif-config will be updated to support the latest {product-title} y-stream version as well as the last three {product-title} supported y-stream versions (beginning with version 4.17).
258
285
286
+
[id="wif-removing-stale-permissions_{context}"]
287
+
== Removing stale permissions from service accounts managed by a WIF configuration
288
+
289
+
The stale set of permissions previously assigned to the `osd-deployer` service account will remain on the account after updating the wif-config. You need to manually access the roles and remove these stale permissions from them.
=== Removing stale deployer permissions from service accounts managed by a WIF configuration
293
+
294
+
To remove the stale deployer permissions, run the following commands on a terminal with access to the Google Cloud project hosting the service accounts.
295
+
296
+
.Procedure
297
+
298
+
. Retrieve the existing role definition, ensuring the `PROJECT_ID` environment variable points to your Google Cloud project:
299
+
+
300
+
[source,terminal]
301
+
----
302
+
$ gcloud iam roles describe \
303
+
osd_deployer_v4.18 \
304
+
--project $PROJECT_ID \
305
+
--format=yaml > /tmp/role.yaml
306
+
----
307
+
+
308
+
. Remove the unwanted permissions. You can do this by filtering out the unwanted permissions from the role definition file and saving the updated definition to a new file:
. Review the changes in the output between the original and updated role definitions to ensure only the unwanted permissions have been removed:
319
+
+
320
+
[source,terminal]
321
+
----
322
+
$ diff /tmp/role.yaml /tmp/updated_role.yaml
323
+
----
324
+
+
325
+
. Update the role in Google Cloud with the updated role definition file, ensuring the `PROJECT_ID` environment variable points to your Google Cloud project:
. Remove the unwanted permissions. You can do this by filtering out the unwanted permissions from the role definition file and saving the updated definition to a new file:
. Review the changes in the output between the original and updated role definitions to ensure only the unwanted permissions have been removed:
357
+
+
358
+
[source,terminal]
359
+
----
360
+
$ diff /tmp/role.yaml /tmp/updated_role.yaml
361
+
----
362
+
+
363
+
. Update the role in Google Cloud with the updated role definition file, ensuring the `PROJECT_ID` environment variable points to your Google Cloud project:
364
+
+
365
+
[source,terminal]
366
+
----
367
+
$ gcloud iam roles update sre_managed_support --project $PROJECT_ID --file=/tmp/updated_role.yaml
368
+
----
369
+
259
370
[id="ocm-cli-verify-wif-commands_{context}"]
260
371
== Verifying a WIF configuration
261
372
You can verify that the configuration of resources associated with a WIF configuration are correct by running the `ocm gcp verify wif-config` command. If a misconfiguration is found, the output provides details about the misconfiguration and recommends that you update the WIF configuration.
Copy file name to clipboardExpand all lines: osd_whats_new/osd-whats-new.adoc
+11-3Lines changed: 11 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,11 +17,21 @@ With its foundation in Kubernetes, {product-title} is a complete {OCP} cluster p
17
17
18
18
[id="osd-q3-2025_{context}"]
19
19
=== Q3 2025
20
+
21
+
* **Updates to Workload Identity Federation (WIF) permissions and roles.**
22
+
The default IAM permissions for WIF in the link:https://github.com/openshift/managed-cluster-config/blob/master/resources/wif/4.19/vanilla.yaml[managed-cluster-config] template have been updated. This means newly created WIF configurations will have fewer, less overly permissive permissions by default.
23
+
** The `[email protected]` principal no longer needs the `compute.firewalls.create` permission. If Red{nbsp}Hat SREs ever need this permission, they will reach out through a support case.
24
+
** The `osd-deployer` service account no longer requires the `resourcemanager.projects.setIamPolicy` permission, which has been removed.
25
+
** The `osd-deployer` service account no longer uses the `iam.serviceAccounts.signBlob` permission. This has been replaced with the `iam.serviceAccountTokenCreator` role, which is now specifically assigned to the service accounts that require it.
26
+
** The `osd-deployer` service account no longer uses the `iam.serviceAccounts.actAs` permission. This has been replaced with the `iam.serviceAccountUser` role, which is now specifically assigned to the service accounts that require it.
27
+
28
+
If you have existing `wif-config` instances, you can get these new, less permissive permissions by running the `ocm gcp update wif-config` command. For more information, see xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#wif-configuration-update_osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Updating a WIF configuration].
29
+
20
30
* **Workload Identify Federation (WIF) is now the default authentication type for {product-title} clusters on {GCP}.**
21
31
In alignment with the principle of least privilege as well as Google Cloud's preferred method of credential authentication, WIF is now the default authentication type when creating an {product-title} cluster on {GCP}. WIF greatly improves an {product-title} cluster's resilience against unauthorized access by using short-lived, least-privilege credentials and eliminating the need for static service account keys. For more information, see xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc[Creating a cluster on GCP with Workload Identity Federation authentication].
22
32
23
33
* **Support for managing workload identity pools and providers in a dedicated {GCP} project.**
24
-
{product-title} on {GCP} now supports the option of creating and managing workload identity pools and providers in a specified dedicated project during the creation of a WIF configuration. Red{nbsp}Hat plans on offering this option for existing WIF configurations in an upcoming release. For more information, see xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#create-wif-configuration_osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Creating a WIF configuration].
34
+
{product-title} on {GCP} now supports the option of creating and managing workload identity pools and providers in a specified dedicated project during the creation of a WIF configuration. Red{nbsp}Hat plans on offering this option for existing WIF configurations in an upcoming release. For more information, see xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#create-wif-configuration_osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Creating a WIF configuration].
25
35
26
36
27
37
@@ -36,8 +46,6 @@ If your cluster uses the OpenShift SDN network plugin, you cannot upgrade to fut
36
46
For more information about migrating to OVN-Kubernetes, see xref:../networking/ovn_kubernetes_network_provider/migrate-from-openshift-sdn-osd.adoc#migrate-from-openshift-sdn[Migrating from OpenShift SDN network plugin to OVN-Kubernetes network plugin].
37
47
38
48
* **New version of {product-title} available.** {product-title} on {gcp} and {product-title} on {aws} versions 4.19 are now available for new clusters.
39
-
// re-add once upgrade to 4.19 is available
40
-
// For more information about upgrading to this latest version, see xref:../upgrading/osd-upgrades.adoc#osd-upgrades[Red Hat OpenShift Dedicated cluster upgrades].
41
49
42
50
* **Support for enabling and disabling Secure Boot for Shielded VMs on a per machine basis.**
43
51
{product-title} on {GCP} users can now enable or disable Secure Boot for Shielded VMs on a per machine basis. For more information, see xref:../osd_cluster_admin/osd_nodes/osd-managing-worker-nodes.adoc#osd-managing-worker-nodes[Managing compute nodes].
0 commit comments