You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: rosa_planning/rosa-sts-ocm-role.adoc
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,15 +12,15 @@ This trust relationship is achieved through the creation and association of the
12
12
13
13
The AWS IAM roles required to use {cluster-manager} are:
14
14
15
-
1.`ocm-role`
16
-
2.`user-role`
15
+
*`ocm-role`
16
+
*`user-role`
17
17
18
18
Whether you manage your clusters using the `rosa` CLI or {cluster-manager} web UI, you must create the account-wide roles, known as `account-roles` in the `rosa` CLI, by using the `rosa` CLI. These account roles are necessary for your first cluster, and these roles can be used across multiple clusters. These required account roles are:
19
19
20
-
1.`Worker-Role`
21
-
1.`Support-Role`
22
-
1.`Installer-Role`
23
-
1.`ControlPlane-Role`
20
+
*`Worker-Role`
21
+
*`Support-Role`
22
+
*`Installer-Role`
23
+
*`ControlPlane-Role`
24
24
25
25
[NOTE]
26
26
====
@@ -31,12 +31,12 @@ For more information about creating these roles, see xref:../rosa_architecture/r
31
31
32
32
Cluster-specific Operator roles, known as `operator-roles` in the `rosa` CLI, obtain the temporary permissions required to carry out cluster operations, such as managing back-end storage, ingress, and registry. These roles are required by the cluster that you create. These required Operator roles are:
For more information on creating these roles, see xref:../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-operator-roles_rosa-sts-about-iam-resources[Cluster-specific Operator IAM role reference].
0 commit comments