Skip to content

Commit 648deaf

Browse files
committed
OSDOCS-3209 - Adding OSD wizard updates
1 parent 6dbacf0 commit 648deaf

33 files changed

+725
-393
lines changed

_topic_maps/_topic_map_osd.yml

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Name: Getting started
5151
Dir: osd_quickstart
5252
Distros: openshift-dedicated
5353
Topics:
54-
- Name: Quickstart for OpenShift Dedicated
54+
- Name: Getting started with OpenShift Dedicated
5555
File: osd-quickstart
5656
---
5757
Name: Red Hat OpenShift Cluster Manager (OCM)
@@ -65,8 +65,12 @@ Name: Creating a cluster
6565
Dir: osd_cluster_create
6666
Distros: openshift-dedicated
6767
Topics:
68-
- Name: Creating your cluster
69-
File: creating-your-cluster
68+
- Name: Understanding your cloud deployment options
69+
File: osd-understanding-your-cloud-deployment-options
70+
- Name: Creating a cluster on AWS
71+
File: creating-an-aws-cluster
72+
- Name: Creating a cluster on GCP
73+
File: creating-a-gcp-cluster
7074
---
7175
Name: Configuring identity providers
7276
Dir: identity_providers

modules/access-cluster.adoc

Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,25 @@
11
// Module included in the following assemblies:
22
//
3-
// * assemblies/accessing-cluster.adoc
4-
// * assemblies/quickstart-osd.adoc
3+
// * osd_quickstart/osd-quickstart.adoc
4+
// * identity_providers/config-identity-providers.adoc
55

66
:_content-type: PROCEDURE
77
[id="access-cluster_{context}"]
88
= Accessing your cluster
99

10-
11-
After you have configured your identity providers, users can access the cluster from the {OCM}.
10+
After you have added a user to your configured identity provider, you can log in to your {product-title} cluster through the web console.
1211

1312
.Prerequisites
1413

15-
* You have created a cluster.
16-
* Identity providers have been configured for your cluster.
14+
* You logged in to {OCM}.
15+
* You created an {product-title} cluster.
16+
* You configured an identity provider for your cluster.
17+
* You added your user account to the configured identity provider.
1718
1819
.Procedure
1920

20-
. From {console-redhat-com}, click on the cluster you want to access.
21-
22-
. Click *Open Console*.
23-
24-
. Click on your identity provider and provide your credentials to log into the cluster.
21+
. Navigate to {console-redhat-com} and select your cluster.
2522

26-
.Verification
23+
. Click *Open console* to open the web console for your cluster.
2724

28-
* After you have accessed the cluster, you are directed to the console for your {product-title} cluster.
25+
. Click on your identity provider and provide your credentials to log in to the cluster. Complete any authorization requests that are presented by your provider.

modules/add-user.adoc

Lines changed: 0 additions & 26 deletions
This file was deleted.

modules/ccs-aws-customer-procedure.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ The Customer Cloud Subscription (CCS) model allows Red Hat to deploy and manage
1313

1414
. If the customer is using AWS Organizations, you must either use an AWS account within your organization or link:https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_create.html#orgs_manage_accounts_create-new[create a new one].
1515

16-
. To ensure that Red Hat can perform necessary actions, you must either create a Service Control Policy (SCP) or ensure that none is applied to the AWS account.
16+
. To ensure that Red Hat can perform necessary actions, you must either create a service control policy (SCP) or ensure that none is applied to the AWS account.
1717

1818
. link:https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html[Attach] the SCP to the AWS account.
1919

modules/ccs-aws-customer-requirements.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313

1414
* The customer ensures that link:https://docs.aws.amazon.com/general/latest/gr/aws_service_limits.html[AWS limits] are sufficient to support {product-title} provisioned within the customer-provided AWS account.
1515

16-
* The customer-provided AWS account should be in the customer's AWS Organization with the applicable Service Control Policy (SCP) applied.
16+
* The customer-provided AWS account should be in the customer's AWS Organization with the applicable service control policy (SCP) applied.
1717
+
1818
[NOTE]
1919
====

modules/ccs-aws-iam.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ IAM policies are subject to modification as the capabilities of {product-title}
3535

3636
** VPC Peering
3737
** VPN Setup
38-
** Direct Connect (only available if granted through the Service Control Policy)
38+
** Direct Connect (only available if granted through the service control policy)
3939
+
4040
[source,json]
4141
----

modules/ccs-aws-scp.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,10 @@
33
// * assemblies/aws-ccs.adoc
44

55
[id="ccs-aws-scp_{context}"]
6-
= Minimum required Service Control Policy (SCP)
6+
= Minimum required service control policy (SCP)
77

88

9-
Service Control Policy (SCP) management is the responsibility of the customer. These policies are maintained in the AWS Organization and control what services are available within the attached AWS accounts.
9+
Service control policy (SCP) management is the responsibility of the customer. These policies are maintained in the AWS Organization and control what services are available within the attached AWS accounts.
1010

1111
[cols="2a,2a,2a,2a",options="header"]
1212

modules/ccs-aws-understand.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,4 +11,4 @@ To deploy {product-title} into your existing Amazon Web Services (AWS) account u
1111

1212
Red Hat recommends the usage of an AWS Organization to manage multiple AWS accounts. The AWS Organization, managed by the customer, hosts multiple AWS accounts. There is a root account in the organization that all accounts will refer to in the account hierarchy.
1313

14-
It is recommended for the {product-title} cluster using a CCS model to be hosted in an AWS account within an AWS Organizational Unit. A Service Control Policy (SCP) is created and applied to the AWS Organizational Unit that manages what services the AWS sub-accounts are permitted to access. The SCP applies only to available permissions within a single AWS account for all AWS sub-accounts within the Organizational Unit. It is also possible to apply a SCP to a single AWS account. All other accounts in the customer’s AWS Organization are managed in whatever manner the customer requires. Red Hat Site Reliability Engineers (SRE) will not have any control over SCPs within the AWS Organization.
14+
It is recommended for the {product-title} cluster using a CCS model to be hosted in an AWS account within an AWS Organizational Unit. A service control policy (SCP) is created and applied to the AWS Organizational Unit that manages what services the AWS sub-accounts are permitted to access. The SCP applies only to available permissions within a single AWS account for all AWS sub-accounts within the Organizational Unit. It is also possible to apply a SCP to a single AWS account. All other accounts in the customer’s AWS Organization are managed in whatever manner the customer requires. Red Hat Site Reliability Engineers (SRE) will not have any control over SCPs within the AWS Organization.

modules/config-idp.adoc

Lines changed: 47 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,11 @@
66
[id="config-idp_{context}"]
77
= Configuring an identity provider
88

9+
After you have installed {product-title}, you must configure your cluster to use an identity provider. You can then add members to your identity provider to grant them access to your cluster.
910

10-
After your {product-title} cluster is created, you must configure identity providers to determine how users log in to access the cluster. This example configures a GitHub identity provider.
11+
You can configure different identity provider types for your {product-title} cluster. Supported types include GitHub, GitHub Enterprise, GitLab, Google, LDAP, OpenID Connect, and HTPasswd identity providers.
12+
13+
The following procedure configures a GitHub identity provider as an example.
1114

1215
[WARNING]
1316
====
@@ -16,53 +19,72 @@ Configuring GitHub authentication allows users to log in to {product-title} with
1619

1720
.Prerequisites
1821

19-
* The OAuth application must be created directly within the GitHub link:https://docs.github.com/en/github/setting-up-and-managing-organizations-and-teams/managing-organization-settings[organization settings] by the GitHub organization administrator.
20-
* link:https://docs.github.com/en/github/setting-up-and-managing-organizations-and-teams[GitHub organizations or teams] are set up in your GitHub account.
22+
* You logged in to {OCM}.
23+
* You created an {product-title} cluster.
24+
* You have a GitHub user account.
25+
* You created a GitHub organization in your GitHub account. For more information, see link:https://docs.github.com/en/organizations/collaborating-with-groups-in-organizations/creating-a-new-organization-from-scratch[Creating a new organization from scratch] in the GitHub documentation.
26+
* If you are restricting user access to a GitHub team, you have created a team within your GitHub organization. For more information, see link:https://docs.github.com/en/organizations/organizing-members-into-teams/creating-a-team[Creating a team] in the GitHub documentation.
2127
2228
.Procedure
2329

24-
. Navigate to the *Clusters* page and select the cluster that you need to configure identity providers for.
30+
. Navigate to {console-redhat-com} and select your cluster.
31+
32+
. Select *Access control* -> *Identity providers*.
33+
34+
. Select the *GitHub* identity provider type from the *Add identity provider* drop-down menu.
2535

26-
. Click the *Access control* tab.
36+
. Enter a unique name for the identity provider. The name cannot be changed later.
2737

28-
. Click *Add identity provider*.
38+
. Register an OAuth application in your GitHub organization by following the steps in the link:https://docs.github.com/en/developers/apps/creating-an-oauth-app[GitHub documentation].
2939
+
3040
[NOTE]
3141
====
32-
You can also click the *Add Oauth configuration* link in the warning message displayed after cluster creation to configure your identity providers.
42+
You must register the OAuth app under your GitHub organization. If you register an OAuth application that is not owned by the organization that contains your cluster users or teams, then user authentication to the cluster will not succeed.
3343
====
3444

35-
. Select *GitHub* from the drop-down menu.
36-
37-
. Enter a unique name for the identity provider. This name cannot be changed later.
38-
** An *OAuth callback URL* is automatically generated in the provided field. You will use this to register the GitHub application.
45+
* For the homepage URL in your GitHub OAuth app configuration, specify the `\https://oauth-openshift.apps.<cluster_name>.<cluster_domain>` portion of the *OAuth callback URL* that is automatically generated in the *Add a GitHub identity provider* page on {OCM}.
46+
+
47+
The following is an example of a homepage URL for a GitHub identity provider:
3948
+
4049
----
41-
https://oauth-openshift.apps.<cluster_name>.<cluster_domain>/oauth2callback/<idp_provider_name>
50+
https://oauth-openshift.apps.example-openshift-cluster.com
4251
----
43-
+
44-
For example:
52+
53+
* For the authorization callback URL in your GitHub OAuth app configuration, specify the full *OAuth callback URL* that is automatically generated in the *Add a GitHub identity provider* page on {OCM}. The full URL has the following syntax:
4554
+
4655
----
47-
https://oauth-openshift.apps.example-openshift-cluster.com/oauth2callback/github/
56+
https://oauth-openshift.apps.<cluster_name>.<cluster_domain>/oauth2callback/<idp_provider_name>
4857
----
4958
50-
. link:https://docs.github.com/en/developers/apps/creating-an-oauth-app[Register an application on GitHub].
59+
. Return to the *Edit identity provider: GitHub* dialog in {OCM} and select *Claim* from the *Mapping method* drop-down menu.
5160

52-
. Return to {product-title} and select a mapping method from the drop-down menu. *Claim* is recommended in most cases.
61+
. Enter the *Client ID* and *Client secret* for your GitHub OAuth application. The GitHub page for your OAuth app provides the ID and secret.
5362

54-
. Enter the *Client ID* and *Client secret* provided by GitHub.
55-
56-
. Enter a *hostname*. A hostname must be entered when using a hosted instance of GitHub Enterprise.
63+
. Optional: Enter a *hostname*.
64+
+
65+
[NOTE]
66+
====
67+
A hostname must be entered when using a hosted instance of GitHub Enterprise.
68+
====
5769

58-
. Optional: You can use a certificate authority (CA) file to validate server certificates for the configured GitHub Enterprise URL. Click *Browse* to locate and attach a *CA file* to the identity provider.
70+
. Optional: You can specify a certificate authority (CA) file to validate server certificates for a configured GitHub Enterprise URL. Click *Browse* to locate and attach a *CA file* to the identity provider.
5971

60-
. Select *Use organizations* or *Use teams* to restrict access to a particular GitHub organization or a GitHub team.
72+
. Select *Use organizations* or *Use teams* to restrict access to a GitHub organization or a GitHub team within an organization.
6173

62-
. Enter the name of the organization or team you would like to restrict access to. Click *Add more* to specify multiple organizations or teams that users can be a member of.
74+
. Enter the name of the organization or team you would like to restrict access to. Click *Add more* to specify multiple organizations or teams.
75+
+
76+
[NOTE]
77+
====
78+
Specified organizations must own an OAuth app that was registered by using the preceding steps. If you specify a team, it must exist within an organization that owns an OAuth app that was registered by using the preceding steps.
79+
====
6380

64-
. Click *Confirm*.
81+
. Click *Add* to apply the identity provider configuration.
82+
+
83+
[NOTE]
84+
====
85+
It might take approximately two minutes for the identity provider configuration to become active.
86+
====
6587

6688
.Verification
6789

68-
* The configured identity provider is now visible on the *Access control* tab of the *Clusters* page.
90+
* After the configuration becomes active, the identity provider is listed under *Access control* -> *Identity providers* on the {OCM} page for your cluster.

modules/create-aws-cluster.adoc

Lines changed: 0 additions & 99 deletions
This file was deleted.

0 commit comments

Comments
 (0)