Skip to content

Commit d6f0057

Browse files
authored
Merge pull request #44837 from jeana-redhat/OSDOCS-3346_AWS_ccoctl_permission_reqs
[OSDOCS-3346]: Add AWS ccoctl permissions reqs
2 parents 54551a4 + 3b18d77 commit d6f0057

File tree

2 files changed

+46
-1
lines changed

2 files changed

+46
-1
lines changed

authentication/managing_cloud_provider_credentials/cco-mode-sts.adoc

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
:_content-type: ASSEMBLY
22
[id="cco-mode-sts"]
3-
= Using manual mode with STS
3+
= Using manual mode with Amazon Web Services Secure Token Service
44
include::_attributes/common-attributes.adoc[]
55
:context: cco-mode-sts
66

@@ -13,6 +13,9 @@ Manual mode with STS is supported for Amazon Web Services (AWS).
1313
This credentials strategy is supported for only new {product-title} clusters and must be configured during installation. You cannot reconfigure an existing cluster that uses a different credentials strategy to use this feature.
1414
====
1515

16+
[id="sts-mode-about"]
17+
== About manual mode with AWS Secure Token Service
18+
1619
In manual mode with STS, the individual {product-title} cluster components use AWS Secure Token Service (STS) to assign components IAM roles that provide short-term, limited-privilege security credentials. These credentials are associated with IAM roles that are specific to each component that makes AWS API calls.
1720

1821
Requests for new and refreshed credentials are automated by using an appropriately configured AWS IAM OpenID Connect (OIDC) identity provider, combined with AWS IAM roles. {product-title} signs service account tokens that are trusted by AWS IAM, and can be projected into a pod and used for authentication. Tokens are refreshed after one hour.

modules/cco-ccoctl-configuring.adoc

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,48 @@ endif::alibabacloud[]
3737
The `ccoctl` is a Linux binary that must run in a Linux environment.
3838
====
3939

40+
ifdef::aws-sts[]
41+
.Prerequisites
42+
43+
* You have created an AWS account for the `ccoctl` to use with the following permissions:
44+
+
45+
.Required AWS permissions
46+
[cols="a,a"]
47+
|====
48+
|`iam` permissions |`s3` permissions
49+
50+
|* `iam:CreateOpenIDConnectProvider`
51+
* `iam:CreateRole`
52+
* `iam:DeleteOpenIDConnectProvider`
53+
* `iam:DeleteRole`
54+
* `iam:DeleteRolePolicy`
55+
* `iam:GetOpenIDConnectProvider`
56+
* `iam:GetRole`
57+
* `iam:GetUser`
58+
* `iam:ListOpenIDConnectProviders`
59+
* `iam:ListRolePolicies`
60+
* `iam:ListRoles`
61+
* `iam:PutRolePolicy`
62+
* `iam:TagOpenIDConnectProvider`
63+
* `iam:TagRole`
64+
|* `s3:CreateBucket`
65+
* `s3:DeleteBucket`
66+
* `s3:DeleteObject`
67+
* `s3:GetBucketAcl`
68+
* `s3:GetBucketTagging`
69+
* `s3:GetObject`
70+
* `s3:GetObjectAcl`
71+
* `s3:GetObjectTagging`
72+
* `s3:ListBucket`
73+
* `s3:PutBucketAcl`
74+
* `s3:PutBucketTagging`
75+
* `s3:PutObject`
76+
* `s3:PutObjectAcl`
77+
* `s3:PutObjectTagging`
78+
79+
|====
80+
endif::aws-sts[]
81+
4082
.Procedure
4183

4284
. Obtain the {product-title} release image:

0 commit comments

Comments
 (0)