Skip to content

Commit f8a536a

Browse files
authored
Merge pull request #67857 from sbeskin-redhat/OADP_2872_add
OADP-2872 additional
2 parents 0db393e + 0259fd5 commit f8a536a

File tree

2 files changed

+9
-3
lines changed

2 files changed

+9
-3
lines changed

modules/oadp-gcp-wif-cloud-authentication.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
Applications running outside Google Cloud use service account keys, such as usernames and passwords, to gain access to Google Cloud resources. These service account keys might become a security risk if they are not properly managed.
1010

11-
With Google's workload identity federation you can use Identity and Access Management (IAM) to offer external identities IAM roles, including the ability to impersonate service accounts. This eliminates the maintenance and security risks associated with service account keys.
11+
With Google's workload identity federation, you can use Identity and Access Management (IAM) to offer IAM roles, including the ability to impersonate service accounts, to external identities. This eliminates the maintenance and security risks associated with service account keys.
1212

1313
Workload identity federation handles encrypting and decrypting certificates, extracting user attributes, and validation. Identity federation externalizes authentication, passing it over to Security Token Services (STS), and reduces the demands on individual developers. Authorization and controlling access to resources remain the responsibility of the application.
1414

@@ -17,6 +17,11 @@ Workload identity federation handles encrypting and decrypting certificates, ext
1717
Google workload identity federation is available for OADP 1.3.x and later.
1818
====
1919

20+
[NOTE]
21+
====
22+
For backing up volumes, OADP on GCP with Google workload identity federation authentication supports only CSI snapshots.
23+
====
24+
2025
If you do not use Google workload identity federation cloud authentication, continue to _Installing the Data Protection Application_.
2126

2227
.Prerequisites

modules/oadp-installing-oadp-rosa-sts.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,8 @@ AWS Security Token Service (AWS STS) is a global web service that provides short
1111

1212
[IMPORTANT]
1313
====
14-
Restic and Kopia are not supported in the OADP on ROSA with AWS STS environment. Make sure that the Restic/Kopia node agent is disabled. Use native snapshots or CSI snapshots to back up volumes. See _Known Issues_ for more information.
14+
Restic and Kopia are not supported in the OADP on ROSA with AWS STS environment. Make sure that the Restic/Kopia node agent is disabled.
15+
For backing up volumes, OADP on ROSA with AWS STS supports only native snapshots and CSI snapshots. See _Known Issues_ for more information.
1516
====
1617

1718
[IMPORTANT]
@@ -55,7 +56,7 @@ $ oc create namespace openshift-adp
5556
$ oc -n openshift-adp create secret generic cloud-credentials \
5657
--from-file=${SCRATCH}/credentials
5758
----
58-
59+
+
5960
[NOTE]
6061
====
6162
In {product-title} versions 4.14 and later, the OADP Operator supports a new standardized STS workflow through the Operator Lifecycle Manager (OLM)

0 commit comments

Comments
 (0)