Skip to content

Commit c154e4a

Browse files
authored
Merge pull request #57132 from laubai/ocpdocs-3724-sts-prereq-clarity
OSDOCS#3724: Clarify STS install prereqs re. account association
2 parents ad0c657 + 2d30d4f commit c154e4a

File tree

2 files changed

+15
-3
lines changed

2 files changed

+15
-3
lines changed

modules/rosa-sts-aws-requirements-association-concept.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,6 @@
77
[id="rosa-associating-concept_{context}"]
88
= AWS account association
99

10-
{product-title} (ROSA) cluster-provisioning tasks require linking `ocm-role` and `user-role` {cluster-manager} IAM resources to your AWS account using your Amazon Resource Name (ARN).
10+
{product-title} (ROSA) cluster-provisioning tasks require linking `ocm-role` and `user-role` {cluster-manager} IAM roles to your AWS account using your Amazon Resource Name (ARN).
1111

1212
The `ocm-role` ARN is stored as a label in your Red Hat organization while the `user-role` ARN is stored as a label inside your Red Hat user account. Red Hat uses these ARN labels to confirm that the user is a valid account holder and that the correct permissions are available to perform the necessary tasks in the AWS account.

modules/rosa-sts-aws-requirements-creating-association.adoc

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,27 @@
77
[id="rosa-associating-account_{context}"]
88
= Linking your AWS account
99

10-
You link your AWS account using the `rosa` CLI.
10+
You can link your AWS account to existing IAM roles by using the `rosa` CLI.
1111

1212
.Prerequisites
1313

1414
* You have an AWS account.
1515
* You are using {cluster-manager-url} to create clusters.
1616
* You have the permissions required to install AWS account-wide roles. See the "Additional resources" of this section for more information.
1717
* You have installed and configured the latest AWS (`aws`) and ROSA (`rosa`) CLIs on your installation host.
18-
* You have created your `ocm-role` and `user-role` IAM roles.
18+
* You have created your `ocm-role` and `user-role` IAM roles, but have not yet linked them to your AWS account. You can check whether your IAM roles are already linked by running the following commands:
19+
+
20+
[source,terminal]
21+
----
22+
$ rosa list ocm-role
23+
----
24+
+
25+
[source,terminal]
26+
----
27+
$ rosa list user-role
28+
----
29+
+
30+
If `Yes` is displayed in the `Linked` column for both roles, you have already linked the roles to an AWS account.
1931
2032
.Procedure
2133

0 commit comments

Comments
 (0)