Skip to content

Commit 85f0330

Browse files
authored
Merge pull request #39418 from kelbrown20/updating-FIPS-support-doc-2003958
BZ:2003958 - Updating FIPS support docs for RHEL8
2 parents 0475dbf + fd7687e commit 85f0330

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

installing/installing-fips.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Because FIPS must be enabled before the operating system that your cluster uses
1414
[id="installation-about-fips-validation_{context}"]
1515
== FIPS validation in {product-title}
1616

17-
{product-title} uses certain FIPS Validated / Modules in Process modules within {op-system-base} and {op-system} for the operating system components that it uses. See link:https://access.redhat.com/articles/3359851[RHEL7 core crypto components]. For example, when users SSH into {product-title} clusters and containers, those connections are properly encrypted.
17+
{product-title} uses certain FIPS Validated / Modules in Process modules within {op-system-base} and {op-system} for the operating system components that it uses. See link:https://access.redhat.com/articles/3655361[RHEL8 core crypto components]. For example, when users SSH into {product-title} clusters and containers, those connections are properly encrypted.
1818

1919
{product-title} components are written in Go and built with Red Hat's golang compiler. When you enable FIPS mode for your cluster, all {product-title} components that require cryptographic signing call {op-system-base} and {op-system} cryptographic libraries.
2020

@@ -25,13 +25,13 @@ Because FIPS must be enabled before the operating system that your cluster uses
2525
|Attributes
2626
|Limitations
2727

28-
|FIPS support in {op-system-base} 7 operating systems.
28+
|FIPS support in {op-system-base} 7, {op-system-base} 8, and {op-system} operating systems.
2929
.3+|The FIPS implementation does not offer a single function that both computes hash functions and validates the keys that are based on that hash. This limitation will continue to be evaluated and improved in future {product-title} releases.
3030

3131
|FIPS support in CRI-O runtimes.
3232
|FIPS support in {product-title} services.
3333

34-
|FIPS Validated / Modules in Process cryptographic module and algorithms that are obtained from {op-system-base} 7 and {op-system} binaries and images.
34+
|FIPS Validated / Modules in Process cryptographic module and algorithms that are obtained from {op-system-base} 7, {op-system-base} 8, and {op-system} binaries and images.
3535
|
3636

3737
|Use of FIPS compatible golang compiler.
@@ -83,4 +83,4 @@ If you are using Azure File storage, you cannot enable FIPS mode.
8383

8484
To apply `AES CBC` encryption to your etcd data store, follow the xref:../security/encrypting-etcd.adoc#encrypting-etcd[Encrypting etcd data] process after you install your cluster.
8585

86-
If you add {op-system-base} nodes to your cluster, ensure that you enable FIPS mode on the machines before their initial boot. See xref:../machine_management/adding-rhel-compute.adoc#adding-rhel-compute[Adding RHEL compute machines to an {product-title} cluster] and link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/chap-federal_standards_and_regulations#sec-Enabling-FIPS-Mode[Enabling FIPS Mode] in the {op-system-base} 7 documentation.
86+
If you add {op-system-base} nodes to your cluster, ensure that you enable FIPS mode on the machines before their initial boot. See xref:../machine_management/adding-rhel-compute.adoc#adding-rhel-compute[Adding RHEL compute machines to an {product-title} cluster] and link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/chap-federal_standards_and_regulations#sec-Enabling-FIPS-Mode[Enabling FIPS Mode] in the {op-system-base} 7 documentation or link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening#enabling-fips-mode-in-a-container_using-the-system-wide-cryptographic-policies[Enabling FIPS Mode] in the {op-system-base} 8 documentation

0 commit comments

Comments
 (0)