|
1 | | -:_content-type: PROCEDURE |
| 1 | +:_content-type: CONCEPT |
2 | 2 | [id="configuring-aws-sts-quay"] |
3 | 3 | = Configuring AWS STS for {productname} |
4 | 4 |
|
5 | | -Support for Amazon Web Services (AWS) Security Token Service (STS) is available for standalone {productname} deployments and {productname-ocp}. AWS STS is a web service for requesting temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users and for users that you authenticate, or _federated users_. This feature is useful for clusters using Amazon S3 as an object storage, allowing {productname} to use STS protocols to authenticate with Amazon S3, which can enhance the overall security of the cluster and help to ensure that access to sensitive data is properly authenticated and authorized. |
| 5 | +Support for Amazon Web Services (AWS) Security Token Service (STS) is available for standalone {productname} deployments, {productname-ocp}, and Red Hat OpenShift Service on AWS (ROSA). AWS STS is a web service for requesting temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users and for users that you authenticate, or _federated users_. This feature is useful for clusters using Amazon S3 as an object storage, allowing {productname} to use STS protocols to authenticate with Amazon S3, which can enhance the overall security of the cluster and help to ensure that access to sensitive data is properly authenticated and authorized. |
6 | 6 |
|
7 | | -Configuring AWS STS is a multi-step process that requires creating an AWS IAM user, creating an S3 role, and configuring your {productname} `config.yaml` file to include the proper resources. |
| 7 | +Configuring AWS STS for {ocp} or ROSA requires creating an AWS IAM user, creating an S3 role, and configuring your {productname} `config.yaml` file to include the proper resources. |
8 | 8 |
|
9 | | -Use the following procedures to configure AWS STS for {productname}. |
10 | | - |
11 | | -[id="creating-am-user"] |
12 | | -== Creating an IAM user |
13 | | - |
14 | | -Use the following procedure to create an IAM user. |
15 | | - |
16 | | -.Procedure |
17 | | - |
18 | | -. Log in to the Amazon Web Services (AWS) console and navigate to the Identity and Access Management (IAM) console. |
19 | | - |
20 | | -. In the navigation pane, under *Access management* click *Users*. |
21 | | - |
22 | | -. Click *Create User* and enter the following information: |
23 | | - |
24 | | -.. Enter a valid username, for example, `quay-user`. |
25 | | - |
26 | | -.. For *Permissions options*, click *Add user to group*. |
27 | | - |
28 | | -. On the *review and create* page, click *Create user*. You are redirected to the *Users* page. |
29 | | - |
30 | | -. Click the username, for example, *quay-user*. |
31 | | - |
32 | | -. Copy the ARN of the user, for example, `arn:aws:iam::123492922789:user/quay-user`. |
33 | | - |
34 | | -. On the same page, click the *Security credentials* tab. |
35 | | - |
36 | | -. Navigate to *Access keys*. |
37 | | - |
38 | | -. Click *Create access key*. |
39 | | - |
40 | | -. On the *Access key best practices & alternatives* page, click *Command Line Interface (CLI)*, then, check the confirmation box. Then click *Next*. |
41 | | - |
42 | | -. Optional. On the *Set description tag - optional* page, enter a description. |
43 | | - |
44 | | -. Click *Create access key*. |
45 | | - |
46 | | -. Copy and store the access key and the secret access key. |
47 | | -+ |
48 | | -[IMPORTANT] |
49 | | -==== |
50 | | -This is the only time that the secret access key can be viewed or downloaded. You cannot recover it later. However, you can create a new access key any time. |
51 | | -==== |
52 | | - |
53 | | -. Click *Done*. |
54 | | - |
55 | | -[id="creating-s3-role"] |
56 | | -== Creating an S3 role |
57 | | - |
58 | | -Use the following procedure to create an S3 role for AWS STS. |
59 | | - |
60 | | -.Prerequisites |
61 | | - |
62 | | -* You have created an IAM user and stored the access key and the secret access key. |
63 | | - |
64 | | -.Procedure |
65 | | - |
66 | | -. If you are not already, navigate to the IAM dashboard by clicking *Dashboard*. |
67 | | - |
68 | | -. In the navigation pane, click *Roles* under *Access management*. |
69 | | - |
70 | | -. Click *Create role*. |
71 | | - |
72 | | -* Click *Custom Trust Policy*, which shows an editable JSON policy. By default, it shows the following information: |
73 | | -+ |
74 | | -[source,json] |
75 | | ----- |
76 | | -{ |
77 | | - "Version": "2012-10-17", |
78 | | - "Statement": [ |
79 | | - { |
80 | | - "Sid": "Statement1", |
81 | | - "Effect": "Allow", |
82 | | - "Principal": {}, |
83 | | - "Action": "sts:AssumeRole" |
84 | | - } |
85 | | - ] |
86 | | -} |
87 | | ----- |
88 | | - |
89 | | -. Under the `Principal` configuration field, add your AWS ARN information. For example: |
90 | | -+ |
91 | | -[source,json] |
92 | | ----- |
93 | | -{ |
94 | | - "Version": "2012-10-17", |
95 | | - "Statement": [ |
96 | | - { |
97 | | - "Sid": "Statement1", |
98 | | - "Effect": "Allow", |
99 | | - "Principal": { |
100 | | - "AWS": "arn:aws:iam::123492922789:user/quay-user" |
101 | | - }, |
102 | | - "Action": "sts:AssumeRole" |
103 | | - } |
104 | | - ] |
105 | | -} |
106 | | ----- |
107 | | - |
108 | | -. Click *Next*. |
109 | | - |
110 | | -. On the *Add permissions* page, type `AmazonS3FullAccess` in the search box. Check the box to add that policy to the S3 role, then click *Next*. |
111 | | - |
112 | | -. On the *Name, review, and create* page, enter the following information: |
113 | | - |
114 | | -.. Enter a role name, for example, `example-role`. |
115 | | - |
116 | | -.. Optional. Add a description. |
117 | | - |
118 | | -. Click the *Create role* button. You are navigated to the *Roles* page. Under *Role name*, the newly created S3 should be available. |
119 | | - |
120 | | -//// |
121 | | -[id="configuring-quay-operator-use-aws-sts"] |
122 | | -== Configuring the {productname} to use AWS STS |
123 | | -
|
124 | | -Depending on your deployment type, whether standalone or on {ocp}, you can use one of the following procedures to edit your `config.yaml` file to use AWS STS. |
125 | | -//// |
| 9 | +Use the following procedures to configure AWS STS for {productname}. |
0 commit comments