You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/rosa-sts-about-ocm-role.adoc
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,11 +6,11 @@
6
6
[id="rosa-sts-about-ocm-role_{context}"]
7
7
= About the ocm-role IAM resource
8
8
9
-
You must create the `ocm-role` IAM resource to enable a Red Hat organization of users to create ROSA clusters.
9
+
You must create the `ocm-role` IAM resource to enable a Red Hat organization of users to create ROSA clusters. Within the context of linking to AWS, a Red Hat organization is a single user within {cluster-manager}.
10
10
11
11
Some considerations for your `ocm-role` IAM resource are:
12
12
13
-
* You have only one `ocm-role`per AWS account in a Red Hat organization. You can have multiple `ocm-role` IAM roles in a Red Hat organization as long as these roles are for different AWS accounts.
13
+
* Only one `ocm-role`IAM role can be linked per Red Hat organization; however, you can have any number of `ocm-role` IAM roles per AWS account. The web UI requires that only one of these roles can be linked at a time.
14
14
* Any user in a Red Hat organization may create and link an `ocm-role` IAM resource.
15
15
* Only the Red Hat Organization Administrator can unlink an `ocm-role` IAM resource. This limitation is to protect other Red Hat organization members from disturbing the interface capabilities of other users.
16
16
+
@@ -19,8 +19,7 @@ Some considerations for your `ocm-role` IAM resource are:
19
19
If you just created a Red Hat account that is not part of an existing organization, this account is also the Red Hat Organization Administrator.
20
20
====
21
21
+
22
-
* Only one `ocm-role` IAM resource can be created per AWS account per Red Hat organization.
23
-
* See the associated permission tables for a list of the AWS permissions policy for the basic and admin `ocm-role` IAM resources.
22
+
* See "Understanding the {cluster-manager} role" in the Additional resources of this section for a list of the AWS permissions policies for the basic and admin `ocm-role` IAM resources.
24
23
25
24
Using the `rosa` CLI, you can link your IAM resource when you create it.
Copy file name to clipboardExpand all lines: modules/rosa-sts-about-user-role.adoc
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,14 +7,15 @@
7
7
[id="rosa-sts-about-user-role_{context}"]
8
8
= About the user-role IAM role
9
9
10
-
You need to create the`user-role` IAM role to enable a Red Hat organization of users to create ROSA clusters.
10
+
You need to create a`user-role` IAM role per web UI user to enable those users to create ROSA clusters.
11
11
12
12
Some considerations for your `user-role` IAM role are:
13
13
14
14
* You only need one `user-role` IAM role per Red Hat user account, but your Red Hat organization can have many of these IAM resources.
15
15
* Any user in a Red Hat organization may create and link an `user-role` IAM role.
16
16
* There can be numerous `user-role` IAM roles per AWS account per Red Hat organization.
17
17
* Red Hat uses the `user-role` IAM role to identify the user. This IAM resource has no AWS account permissions.
18
+
* Your AWS account can have multiple `user-role` IAM roles, but you must link each IAM role to each user in your Red Hat organization. No user can have more than one linked `user-role` IAM role.
* See xref:../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-account-wide-roles-and-policies_rosa-sts-about-iam-resources[Account-wide IAM role and policy reference] for a list of IAM roles needed for cluster creation.
* See xref:../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-account-wide-roles-and-policies_rosa-sts-about-iam-resources[Account-wide IAM role and policy reference] for a list of IAM roles needed for cluster creation.
With the STS deployment model, Red Hat is no longer responsible for creating and managing Amazon Web Services (AWS) IAM policies, IAM users, or IAM roles. For information on creating these roles and policies, see the following sections on IAM roles.
70
+
71
+
* To use the `ocm` CLI, you must have an `ocm-role` and `user-role` resource. See xref:../rosa_planning/rosa-sts-ocm-role.adoc#rosa-sts-ocm-role[OpenShift Cluster Manager IAM role resources].
72
+
* If you have a single cluster, see xref:../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-account-wide-roles-and-policies_rosa-sts-about-iam-resources[Account-wide IAM role and policy reference].
73
+
* For every cluster, you must have the necessary operator roles. See xref:../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-operator-roles_rosa-sts-about-iam-resources[Cluster-specific Operator IAM role reference].
{product-title} (ROSA) web UI needs you to have some permissions on your AWS account that create a trust relationship to provide the end-user experience at {cluster-manager-url} and for the `rosa` command line interface (CLI).
9
+
{product-title} (ROSA) web UI requires that you have specific permissions on your AWS account that create a trust relationship to provide the end-user experience at {cluster-manager-url} and for the `rosa` command line interface (CLI).
10
10
11
-
This trust relationship is achieved through the creation and association of two AWS IAM roles:
11
+
This trust relationship is achieved through the creation and association of the `ocm-role` AWS IAM role. This role has a trust policy with the AWS installer that links your Red Hat account to your AWS account. In addition, you also need a `user-role` AWS IAM role for each web UI user, which serves to identify these users. This `user-role` AWS IAM role has no permissions.
12
+
13
+
The AWS IAM roles required to use {cluster-manager} are:
12
14
13
15
1. `ocm-role`
14
16
2. `user-role`
15
17
16
-
If you use the `rosa` CLI, the `rosa` tool creates a number of these required permissions for you. This creation is available since your user account authenticates for both Red Hat and AWS. In the {cluster-manager} web UI, you need to create these roles.
18
+
Whether you manage your clusters using the `rosa` CLI or {cluster-manager} web UI, you must create the account-wide roles, known as `account-roles` in the `rosa` CLI, by using the `rosa` CLI. These account roles are necessary for your first cluster, and these roles can be used across multiple clusters. These required account roles are:
19
+
20
+
1. `Worker-Role`
21
+
1. `Support-Role`
22
+
1. `Installer-Role`
23
+
1. `ControlPlane-Role`
17
24
18
25
[NOTE]
19
26
====
20
-
Role creation does not request your AWS access or secret keys. This is because it uses an AWS Secure Token Service (STS) as the basis of its workflow.
27
+
Role creation does not request your AWS access or secret keys. AWS Secure Token Service (STS) is used as the basis of this workflow. AWS STS uses temporary, limited-privilege credentials to provide authentication.
21
28
====
29
+
30
+
For more information about creating these roles, see xref:../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-account-wide-roles-and-policies[Account-wide IAM role and policy reference].
31
+
32
+
Cluster-specific Operator roles, known as `operator-roles` in the `rosa` CLI, obtain the temporary permissions required to carry out cluster operations, such as managing back-end storage, ingress, and registry. These roles are required by the cluster that you create. These required Operator roles are:
For more information on creating these roles, see xref:../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-operator-roles_rosa-sts-about-iam-resources[Cluster-specific Operator IAM role reference].
* See xref:../rosa_support/rosa-troubleshooting-iam-resources.adoc#rosa-sts-ocm-roles-and-permissions-troubleshooting[Troubleshooting IAM roles]
61
+
* See xref:../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-account-wide-roles-and-policies[Account-wide IAM role and policy reference] for a list of IAM roles needed for cluster creation.
0 commit comments