@@ -658,6 +658,78 @@ The account number present in the `sts_installer_trust_policy.json` and `sts_sup
658
658
----
659
659
====
660
660
661
+ .ROSA OCM role and policy file
662
+ [cols="1,2",options="header"]
663
+ |===
664
+
665
+ |Resource|Description
666
+
667
+ |`ManagedOpenShift-OCM-Role`
668
+ |You use this IAM role to create and maintain ROSA clusters in {cluster-manager}.
669
+
670
+ |===
671
+
672
+ .`sts_ocm_role_trust_policy.json`
673
+ [%collapsible]
674
+ ====
675
+ [source,json]
676
+ ----
677
+ {
678
+ "Version": "2012-10-17",
679
+ "Statement": [
680
+ {
681
+ "Effect": "Allow",
682
+ "Principal": {
683
+ "AWS": "arn:aws:iam::710019948333:role/RH-Managed-OpenShift-Installer"
684
+ },
685
+ "Action": "sts:AssumeRole",
686
+ "Condition": {
687
+ "StringEquals": {
688
+ "sts:ExternalId": "<OCM_account_ID>"
689
+ }
690
+ }
691
+ }
692
+ ]
693
+ }
694
+ ----
695
+ ====
696
+
697
+ .ROSA user role and policy file
698
+ [cols="1,2",options="header"]
699
+ |===
700
+
701
+ |Resource|Description
702
+
703
+ |`ManagedOpenShift-User-<OCM_user>-Role`
704
+ |An IAM role used by Red{nbsp}Hat to verify the customer's AWS identity.
705
+
706
+ |===
707
+
708
+ .`sts_user_role_trust_policy.json`
709
+ [%collapsible]
710
+ ====
711
+ [source,json]
712
+ ----
713
+ {
714
+ "Version": "2012-10-17",
715
+ "Statement": [
716
+ {
717
+ "Effect": "Allow",
718
+ "Principal": {
719
+ "AWS": "arn:aws:iam::710019948333:role/RH-Managed-OpenShift-Installer"
720
+ },
721
+ "Action": "sts:AssumeRole",
722
+ "Condition": {
723
+ "StringEquals": {
724
+ "sts:ExternalId": "<OCM_account_ID>"
725
+ }
726
+ }
727
+ }
728
+ ]
729
+ }
730
+ ----
731
+ ====
732
+
661
733
.ROSA Ingress Operator IAM policy and policy file
662
734
[cols="1,2",options="header"]
663
735
|===
0 commit comments