Skip to content

Commit daabbfd

Browse files
authored
Merge pull request #96854 from mletalie/OSDOCS-14567
[OSDOCS-14567] Doc Story for Cross-Project Federated Identity Authentication for OSD-GCP
2 parents 3414017 + c8a1bd2 commit daabbfd

File tree

3 files changed

+27
-0
lines changed

3 files changed

+27
-0
lines changed

modules/create-wif-cluster-cli.adoc

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,10 +46,26 @@ Alternatively, you can use the `manual` mode. In `manual` mode, you are provided
4646
$ ocm gcp create wif-config --name <wif_name> \ <1>
4747
--project <gcp_project_id> \ <2>
4848
--version <osd_version> <3>
49+
--federated-project <gcp_project_id> <4>
4950
----
5051
<1> Replace `<wif_name>` with the name of your WIF configuration.
5152
<2> Replace `<gcp_project_id>` with the ID of the {GCP} project where the WIF configuration will be implemented.
5253
<3> Optional: Replace `<osd_version>` with the desired {product-title} version the wif-config will need to support. If you do not specify a version, the wif-config will support the latest {product-title} y-stream version as well as the last three supported {product-title} y-stream versions (beginning with version 4.17).
54+
<4> Optional: Replace `<gcp_project_id>` with the ID of the dedicated project where the workload identity pools and providers will be created and managed. If the `--federated-project` flag is not specified, the workload identity pools and providers will be created and managed in the project specified by the `--project` flag.
55+
+
56+
57+
[NOTE]
58+
=====
59+
Using a dedicated project to create and manage workload identity pools and providers is recommended by {GCP}.
60+
Using a dedicated project helps you to establish centralized governance over the configuration of workload identity pools and providers, enforce uniform attribute mappings and conditions throughout all projects and applications, and ensure that only authorized identity providers can authenticate with WIF.
61+
62+
For more information, see link:https://cloud.google.com/iam/docs/best-practices-for-using-workload-identity-federation#dedicated-project[Use a dedicated project to manage workload identity pools and providers].
63+
=====
64+
+
65+
[IMPORTANT]
66+
====
67+
Creating and managing workload identity pools and providers in a dedicated project is only allowed during initial WIF configuration creation. The `--federated-project` flag cannot be applied to existing `wif-configs`.
68+
====
5369
+
5470
--
5571
.Example output

modules/create-wif-cluster-ocm.adoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,9 +39,13 @@ Workload Identity Federation (WIF), Google Cloud's recommended method of authent
3939
----
4040
$ ocm gcp create wif-config --name <wif_name> \ <1>
4141
--project <gcp_project_id> \ <2>
42+
--version <osd_version> <3>
43+
--federated-project <gcp_project_id> <4>
4244
----
4345
<1> Replace `<wif_name>` with the name of your WIF configuration.
4446
<2> Replace `<gcp_project_id>` with the ID of the {GCP} project where the WIF configuration will be implemented.
47+
<3> Optional: Replace `<osd_version>` with the desired {product-title} version the wif-config will need to support. If you do not specify a version, the wif-config will support the latest {product-title} y-stream version as well as the last three supported {product-title} y-stream versions (beginning with version 4.17).
48+
<4> Optional: Replace `<gcp_project_id>` with the ID of the dedicated project where the workload identity pools and providers will be created and managed. If `--federated-project` is not specified, the workload identity pools and providers will be created and managed in the project specified by the `--project flag`.
4549
+
4650
. Select a configured WIF configuration from the *WIF configuration* drop-down list. If you want to select the WIF configuration you created in the last step, click *Refresh* first.
4751
+

osd_whats_new/osd-whats-new.adoc

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,13 @@ With its foundation in Kubernetes, {product-title} is a complete {OCP} cluster p
2121
In alignment with the principle of least privilege as well as Google Cloud's preferred method of credential authentication, WIF is now the default authentication type when creating an {product-title} cluster on {GCP}. WIF greatly improves an {product-title} cluster's resilience against unauthorized access by using short-lived, least-privilege credentials and eliminating the need for static service account keys. For more information, see xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc[Creating a cluster on GCP with Workload Identity Federation authentication].
2222

2323
[id="osd-q2-2025_{context}"]
24+
25+
=== Q3 2025
26+
* ** Support for managing workload identity pools and providers in a dedicated {GCP} project.**
27+
{product-title} on {GCP} now supports the option of creating and managing workload identity pools and providers in a specified dedicated project during the creation of a WIF configuration. Red{nbsp}Hat plans on offering this option for existing WIF configurations in an upcoming release. For more information, see xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#create-wif-configuration_osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Creating a WIF configuration].
28+
29+
30+
2431
=== Q2 2025
2532

2633
// * **{product-title} SDN network plugin blocks future major upgrades**

0 commit comments

Comments
 (0)