Skip to content

Commit ba26ce7

Browse files
authored
Merge pull request #59434 from jneczypor/OSDOCS-4058
OSDOCS-4058
2 parents cd7732b + 06b59aa commit ba26ce7

File tree

5 files changed

+8
-8
lines changed

5 files changed

+8
-8
lines changed

_topic_maps/_topic_map_rosa.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ Distros: openshift-rosa
9191
Topics:
9292
- Name: AWS prerequisites for ROSA with STS
9393
File: rosa-sts-aws-prereqs
94-
- Name: OpenShift Cluster Manager IAM role resources
94+
- Name: ROSA IAM role resources
9595
File: rosa-sts-ocm-role
9696
- Name: Limits and scalability
9797
File: rosa-limits-scalability

modules/rosa-sts-aws-requirements-association-concept.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@
66
[id="rosa-associating-concept_{context}"]
77
= AWS account association
88

9-
{product-title} (ROSA) cluster-provisioning tasks require linking `ocm-role` and `user-role` {cluster-manager} IAM roles to your AWS account using your Amazon Resource Name (ARN).
9+
{product-title} (ROSA) cluster-provisioning tasks require linking `ocm-role` and `user-role` IAM roles to your AWS account using your Amazon Resource Name (ARN).
1010

1111
The `ocm-role` ARN is stored as a label in your Red Hat organization while the `user-role` ARN is stored as a label inside your Red Hat user account. Red Hat uses these ARN labels to confirm that the user is a valid account holder and that the correct permissions are available to perform the necessary tasks in the AWS account.

modules/rosa-sts-ocm-role-creation.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@
44
// * rosa_planning/rosa-sts-ocm-role.adoc
55
:_content-type: PROCEDURE
66
[id="rosa-sts-ocm-roles-and-permissions-iam-basic-role_{context}"]
7-
= Creating an {cluster-manager} IAM role
7+
= Creating an ocm-role IAM role
88

9-
You create your {cluster-manager} IAM roles by using the command-line interface (CLI).
9+
You create your `ocm-role` IAM roles by using the command-line interface (CLI).
1010

1111
.Prerequisites
1212

modules/rosa-sts-user-role-creation.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,17 +4,17 @@
44
// * rosa_planning/rosa-sts-ocm-role.adoc
55
:_content-type: PROCEDURE
66
[id="rosa-sts-user-role-iam-basic-role_{context}"]
7-
= Creating an user-role IAM role
7+
= Creating a user-role IAM role
88

9-
You can create your {cluster-manager} IAM roles by using the command-line interface (CLI).
9+
You can create your `user-role` IAM roles by using the command-line interface (CLI).
1010

1111
.Prerequisites
1212

1313
* You have an AWS account.
1414
* You have installed and configured the latest AWS (`aws`) and ROSA (`rosa`) CLIs on your installation host.
1515
1616
.Procedure
17-
* To create an ocm-role IAM role with basic privileges, run the following command:
17+
* To create a `user-role` IAM role with basic privileges, run the following command:
1818
+
1919
[source,terminal]
2020
----

rosa_planning/rosa-sts-ocm-role.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
include::_attributes/attributes-openshift-dedicated.adoc[]
33
:context: rosa-sts-ocm-role
44
[id="rosa-sts-ocm-role"]
5-
= {cluster-manager} IAM role resources
5+
= ROSA IAM role resources
66

77
toc::[]
88

0 commit comments

Comments
 (0)