Skip to content

Commit 7dbb272

Browse files
committed
[BZ2035368]: Explain non-STS clusters cannot switch to STS
1 parent 8ba91e4 commit 7dbb272

File tree

3 files changed

+20
-0
lines changed

3 files changed

+20
-0
lines changed

authentication/managing_cloud_provider_credentials/cco-mode-gcp-workload-identity.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,11 @@ toc::[]
88

99
Manual mode with GCP Workload Identity is supported for Google Cloud Platform (GCP).
1010

11+
[NOTE]
12+
====
13+
This credentials strategy is supported for only new {product-title} clusters and must be configured during installation. You cannot reconfigure an existing cluster that uses a different credentials strategy to use this feature.
14+
====
15+
1116
In manual mode with GCP Workload Identity, the individual {product-title} cluster components can impersonate IAM service accounts using short-term, limited-privilege credentials.
1217

1318
Requests for new and refreshed credentials are automated by using an appropriately configured OpenID Connect (OIDC) identity provider, combined with IAM service accounts. {product-title} signs service account tokens that are trusted by GCP, and can be projected into a pod and used for authentication. Tokens are refreshed after one hour by default.

authentication/managing_cloud_provider_credentials/cco-mode-sts.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,11 @@ toc::[]
88

99
Manual mode with STS is supported for Amazon Web Services (AWS).
1010

11+
[NOTE]
12+
====
13+
This credentials strategy is supported for only new {product-title} clusters and must be configured during installation. You cannot reconfigure an existing cluster that uses a different credentials strategy to use this feature.
14+
====
15+
1116
In manual mode with STS, the individual {product-title} cluster components use AWS Secure Token Service (STS) to assign components IAM roles that provide short-term, limited-privilege security credentials. These credentials are associated with IAM roles that are specific to each component that makes AWS API calls.
1217

1318
Requests for new and refreshed credentials are automated by using an appropriately configured AWS IAM OpenID Connect (OIDC) identity provider, combined with AWS IAM roles. {product-title} signs service account tokens that are trusted by AWS IAM, and can be projected into a pod and used for authentication. Tokens are refreshed after one hour.

modules/alternatives-to-storing-admin-secrets-in-kube-system.adoc

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,13 +32,23 @@ ifdef::aws[]
3232
* *Use the Amazon Web Services Security Token Service*:
3333
+
3434
You can use the CCO utility (`ccoctl`) to configure the cluster to use the Amazon Web Services Security Token Service (AWS STS). When the CCO utility is used to configure the cluster for STS, it assigns IAM roles that provide short-term, limited-privilege security credentials to components.
35+
+
36+
[NOTE]
37+
====
38+
This credentials strategy is supported for only new {product-title} clusters and must be configured during installation. You cannot reconfigure an existing cluster that uses a different credentials strategy to use this feature.
39+
====
3540

3641
endif::aws[]
3742

3843
ifdef::google-cloud-platform[]
3944
* *Use manual mode with GCP Workload Identity*:
4045
+
4146
You can use the CCO utility (`ccoctl`) to configure the cluster to use manual mode with GCP Workload Identity. When the CCO utility is used to configure the cluster for GCP Workload Identity, it signs service account tokens that provide short-term, limited-privilege security credentials to components.
47+
+
48+
[NOTE]
49+
====
50+
This credentials strategy is supported for only new {product-title} clusters and must be configured during installation. You cannot reconfigure an existing cluster that uses a different credentials strategy to use this feature.
51+
====
4252

4353
endif::google-cloud-platform[]
4454

0 commit comments

Comments
 (0)