Skip to content

Commit c2afe57

Browse files
authored
Merge pull request #43756 from EricPonvelle/OSDOCS-3355_RH_Account_Number-Roles
OSDOCS-3355: Adds RH Account Number to ROSA Roles and Policies
2 parents a3ad28f + 2a8271c commit c2afe57

File tree

1 file changed

+7
-2
lines changed

1 file changed

+7
-2
lines changed

modules/rosa-sts-account-wide-roles-and-policies.adoc

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,11 @@ This section provides details about the account-wide IAM roles and policies that
99

1010
The account-wide roles and policies are specific to an OpenShift minor release version, for example OpenShift 4.8, and are backward compatible. You can minimize the required STS resources by reusing the account-wide roles and policies for multiple clusters of the same minor version, regardless of their patch version.
1111

12+
[NOTE]
13+
====
14+
The account number present in the `sts_installer_trust_policy.json` and `sts_support_trust_policy.json` samples represents the Red Hat account that is allowed to assume the required roles.
15+
====
16+
1217
.ROSA installer role, policy, and policy files
1318
[cols="1,2",options="header"]
1419
|===
@@ -35,7 +40,7 @@ The account-wide roles and policies are specific to an OpenShift minor release v
3540
"Effect": "Allow",
3641
"Principal": {
3742
"AWS": [
38-
"arn:aws:iam::%{aws_account_id}:role/RH-Managed-OpenShift-Installer"
43+
"arn:aws:iam::710019948333:role/RH-Managed-OpenShift-Installer"
3944
]
4045
},
4146
"Action": [
@@ -419,7 +424,7 @@ The account-wide roles and policies are specific to an OpenShift minor release v
419424
"Effect": "Allow",
420425
"Principal": {
421426
"AWS": [
422-
"arn:aws:iam::%{aws_account_id}:role/RH-Technical-Support-Access"
427+
"arn:aws:iam::710019948333:role/RH-Technical-Support-Access"
423428
]
424429
},
425430
"Action": [

0 commit comments

Comments
 (0)