Skip to content

Commit 3dc5d64

Browse files
committed
OSDOCS-7644
1 parent f0f6c6a commit 3dc5d64

File tree

3 files changed

+17
-0
lines changed

3 files changed

+17
-0
lines changed

modules/rosa-policy-identity-access-management.adoc

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,17 @@ Red Hat personnel do not access AWS accounts in the course of routine {product-t
5050

5151
SREs generate a short-lived AWS access token for a reserved role using the AWS Security Token Service (STS). Access to the STS token is audit-logged and traceable back to individual users. Both STS and non-STS clusters use the AWS STS service for SRE access. For non-STS clusters, the `BYOCAdminAccess` role has the `AdministratorAccess` IAM policy attached, and this role is used for administration. For STS clusters, the `ManagedOpenShift-Support-Role` has the `ManagedOpenShift-Support-Access` policy attached, and this role is used for administration.
5252

53+
[id="rosa-sre-sts-view-aws-account_{context}"]
54+
== SRE STS view of AWS accounts
55+
56+
When SRE is on VPN through two-factor authentication, Red Hat Support and SRE can assume the `ManagedOpenShift-Support-Role` in your AWS Account. `ManagedOpenShift-Support-Role` has all the permissions necessary for SRE to troubleshoot AWS resources. Upon assumption of the `ManagedOpenShift-Support-Role`, SRE uses a AWS Security Token Service (STS) to perform troubleshooting actions in your account. SRE can perform multiple actions which include:
57+
58+
* Viewing CloudTrail logs
59+
* Shutting down a faulty EC2 Instance
60+
* Creating EC2 snapshots
61+
62+
For a full list of permissions, see sts_support_permission_policy.json in the link:https://docs.openshift.com/rosa/rosa_architecture/rosa-sts-about-iam-resources.html[About IAM resources for ROSA clusters that use STS] user guide.
63+
5364
[id="rosa-policy-rh-access_{context}"]
5465
== Red Hat support access
5566
Members of the Red Hat Customer Experience and Engagement (CEE) team typically have read-only access to parts of the cluster. Specifically, CEE has limited access to the core and product namespaces and does not have access to the customer namespaces.
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
1+
////
12
:_content-type: ASSEMBLY
23
include::_attributes/attributes-openshift-dedicated.adoc[]
34
:context: osd-sre-access
45
[id="osd-sre-access"]
56
= SRE and service account access
7+
////
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
1+
////
12
:_content-type: ASSEMBLY
23
include::_attributes/attributes-openshift-dedicated.adoc[]
34
:context: rosa-sre-access
45
[id="rosa-sre-access"]
56
= SRE and service account access
7+
8+
include::modules/rosa-policy-identity-access-management.adoc[leveloffset=+1]
9+
////

0 commit comments

Comments
 (0)