Skip to content

Commit 84cddf6

Browse files
authored
Merge pull request #55728 from jeana-redhat/AWS-STS-correct-name
[OSDOCS-5271]: Fix AWS STS terms
2 parents 460a199 + ce5dd5d commit 84cddf6

15 files changed

+24
-24
lines changed

_topic_maps/_topic_map.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1059,7 +1059,7 @@ Topics:
10591059
File: cco-mode-passthrough
10601060
- Name: Using manual mode
10611061
File: cco-mode-manual
1062-
- Name: Using manual mode with AWS Secure Token Service
1062+
- Name: Using manual mode with AWS Security Token Service
10631063
File: cco-mode-sts
10641064
- Name: Using manual mode with GCP Workload Identity
10651065
File: cco-mode-gcp-workload-identity
@@ -1153,7 +1153,7 @@ Topics:
11531153
File: understanding-aws-load-balancer-operator
11541154
- Name: Installing the AWS Load Balancer Operator
11551155
File: install-aws-load-balancer-operator
1156-
- Name: Installing the AWS Load Balancer Operator on Secure Token Service cluster
1156+
- Name: Installing the AWS Load Balancer Operator on Security Token Service cluster
11571157
File: installing-albo-sts-cluster
11581158
- Name: Creating an instance of the AWS Load Balancer Controller
11591159
File: create-instance-aws-load-balancer-controller

authentication/managing_cloud_provider_credentials/about-cloud-credential-operator.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Mint mode is the default and recommended best practice setting for the CCO to us
2626

2727
* **xref:../../authentication/managing_cloud_provider_credentials/cco-mode-manual.adoc#cco-mode-manual[Manual]**: In manual mode, a user manages cloud credentials instead of the CCO.
2828

29-
** **xref:../../authentication/managing_cloud_provider_credentials/cco-mode-sts.adoc#cco-mode-sts[Manual with AWS Secure Token Service]**: In manual mode, you can configure an AWS cluster to use Amazon Web Services Secure Token Service (AWS STS). With this configuration, the CCO uses temporary credentials for different components.
29+
** **xref:../../authentication/managing_cloud_provider_credentials/cco-mode-sts.adoc#cco-mode-sts[Manual with AWS Security Token Service]**: In manual mode, you can configure an AWS cluster to use Amazon Web Services Security Token Service (AWS STS). With this configuration, the CCO uses temporary credentials for different components.
3030

3131
** **xref:../../authentication/managing_cloud_provider_credentials/cco-mode-gcp-workload-identity.adoc#cco-mode-gcp-workload-identity[Manual with GCP Workload Identity]**: In manual mode, you can configure a GCP cluster to use GCP Workload Identity. With this configuration, the CCO uses temporary credentials for different components.
3232

authentication/managing_cloud_provider_credentials/cco-mode-manual.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ For information about configuring your cloud provider to use manual mode, see _M
1717
[id="manual-mode-sts-blurb"]
1818
== Manual mode with AWS STS
1919

20-
You can configure an AWS cluster in manual mode to use xref:../../authentication/managing_cloud_provider_credentials/cco-mode-sts.adoc#cco-mode-sts[Amazon Web Services Secure Token Service (AWS STS)]. With this configuration, the CCO uses temporary credentials for different components.
20+
You can configure an AWS cluster in manual mode to use xref:../../authentication/managing_cloud_provider_credentials/cco-mode-sts.adoc#cco-mode-sts[Amazon Web Services Security Token Service (AWS STS)]. With this configuration, the CCO uses temporary credentials for different components.
2121

2222
include::modules/manually-maintained-credentials-upgrade.adoc[leveloffset=+1]
2323

authentication/managing_cloud_provider_credentials/cco-mode-sts.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
:_content-type: ASSEMBLY
22
[id="cco-mode-sts"]
3-
= Using manual mode with Amazon Web Services Secure Token Service
3+
= Using manual mode with Amazon Web Services Security Token Service
44
include::_attributes/common-attributes.adoc[]
55
:context: cco-mode-sts
66

@@ -14,9 +14,9 @@ This credentials strategy is supported for only new {product-title} clusters and
1414
====
1515

1616
[id="sts-mode-about"]
17-
== About manual mode with AWS Secure Token Service
17+
== About manual mode with AWS Security Token Service
1818

19-
In manual mode with STS, the individual {product-title} cluster components use AWS Secure Token Service (STS) to assign components IAM roles that provide short-term, limited-privilege security credentials. These credentials are associated with IAM roles that are specific to each component that makes AWS API calls.
19+
In manual mode with STS, the individual {product-title} cluster components use AWS Security Token Service (STS) to assign components IAM roles that provide short-term, limited-privilege security credentials. These credentials are associated with IAM roles that are specific to each component that makes AWS API calls.
2020

2121
Requests for new and refreshed credentials are automated by using an appropriately configured AWS IAM OpenID Connect (OIDC) identity provider, combined with AWS IAM roles. {product-title} signs service account tokens that are trusted by AWS IAM, and can be projected into a pod and used for authentication. Tokens are refreshed after one hour.
2222

modules/bootstrap-aws-load-balancer-operator.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33

44
:_content-type: PROCEDURE
55
[id="nw-bootstra-albo-on-sts-cluster_{context}"]
6-
= Bootstrapping AWS Load Balancer Operator on Secure Token Service cluster
6+
= Bootstrapping AWS Load Balancer Operator on Security Token Service cluster
77

88
.Prerequisites
99

modules/configuring-albo-on-sts-cluster-predefined-credentials.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33

44
:_content-type: PROCEDURE
55
[id="nw-installing-albo-on-sts-cluster-predefined-credentials_{context}"]
6-
= Configuring the AWS Load Balancer Operator on Secure Token Service cluster by using specific credentials
6+
= Configuring the AWS Load Balancer Operator on Security Token Service cluster by using specific credentials
77

88
You can specify the credential secret by using the `spec.credentials` field in the AWS Load Balancer Controller custom resource (CR). You can use the predefined `CredentialsRequest` object of the controller to know which roles are required.
99

modules/configuring-albo-on-sts-cluster.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33

44
:_content-type: PROCEDURE
55
[id="nw-installing-albo-on-sts-cluster_{context}"]
6-
= Configuring AWS Load Balancer Operator on Secure Token Service cluster by using managed `CredentialsRequest` objects
6+
= Configuring AWS Load Balancer Operator on Security Token Service cluster by using managed `CredentialsRequest` objects
77

88
.Prerequisites
99

modules/persistent-storage-csi-efs-sts.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@
77

88
:_content-type: PROCEDURE
99
[id="efs-sts_{context}"]
10-
= Configuring AWS EFS CSI Driver Operator with Secure Token Service
10+
= Configuring AWS EFS CSI Driver Operator with Security Token Service
1111

12-
This procedure explains how to configure the AWS EFS CSI Driver Operator with {product-title} on AWS Secure Token Service (STS).
12+
This procedure explains how to configure the AWS EFS CSI Driver Operator with {product-title} on AWS Security Token Service (STS).
1313

1414
Perform this procedure after installing the AWS EFS CSI Operator, but before installing the AWS EFS CSI driver as part of _Installing the AWS EFS CSI Driver Operator_ procedure. If you perform this procedure after installing the driver and creating volumes, your volumes will fail to mount into pods.
1515

modules/persistent-storage-csi-olm-operator-install.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Be sure to select the *AWS EFS CSI Driver Operator* and not the *AWS EFS Operato
4747
After the installation finishes, the {FeatureName} CSI Operator is listed in the *Installed Operators* section of the web console.
4848

4949
ifdef::AWS_EFS[]
50-
. If you are using {FeatureName} with AWS Secure Token Service (STS), you must configure the {FeatureName} CSI Driver with STS. For more information, see "Configuring AWS EFS CSI Driver with STS".
50+
. If you are using {FeatureName} with AWS Security Token Service (STS), you must configure the {FeatureName} CSI Driver with STS. For more information, see "Configuring AWS EFS CSI Driver with STS".
5151
endif::AWS_EFS[]
5252

5353
. Install the {FeatureName} CSI Driver:

networking/aws_load_balancer_operator/installing-albo-sts-cluster.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
:_content-type: ASSEMBLY
22
[id="albo-sts-cluster"]
3-
= Installing AWS Load Balancer Operator on Secure Token Service cluster
3+
= Installing AWS Load Balancer Operator on a Security Token Service cluster
44
include::_attributes/common-attributes.adoc[]
55
:context: albo-sts-cluster
66

77
toc::[]
88

9-
You can install the AWS Load Balancer Operator on the Secure Token Service (STS) cluster.
9+
You can install the AWS Load Balancer Operator on a Security Token Service (STS) cluster.
1010

1111
The AWS Load Balancer Operator relies on `CredentialsRequest` to bootstrap the Operator and for each `AWSLoadBalancerController` instance. The AWS Load Balancer Operator waits until the required secrets are created and available. The Cloud Credential Operator does not provision the secrets automatically in the STS cluster. You must set the credentials secrets manually by using the `ccoctl` binary.
1212

0 commit comments

Comments
 (0)