Skip to content

Commit e8a4803

Browse files
committed
OSDOCS-17318:Docs update for Cross-Project Federated Identity Authentication for OSD-GCP.
1 parent f3c6298 commit e8a4803

File tree

5 files changed

+11
-33
lines changed

5 files changed

+11
-33
lines changed

modules/create-wif-configuration.adoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@
77
= Creating a Workforce Identity Federation configuration
88

99
[role="_abstract"]
10-
1110
You can create a WIF configuration using the `auto` mode or the `manual` mode in the `ocm` CLI.
1211

1312
The `auto` mode enables you to automatically create the service accounts for {product-title} components as well as other IAM resources.

modules/osd-release-notes-Q4-2025.adoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@
55
[id="osd-q4-2025_{context}"]
66
= Q4 2025
77

8+
* **Support for managing workload identity pools and providers in a dedicated {GCP} project.**
9+
{product-title} on {GCP} now lets you update an existing Workforce Identity Federation (WIF) configuration to use a dedicated project for managing workload identity pools and providers.
10+
For more information, see xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#wif-configuration-update[Updating a Workforce Identity Federation configuration].
11+
812
* **Required API services table updated.**
913
The _Required API services_ table within the _Required customer procedure_ guide has been updated to restore APIs that were previously removed due to a bug. These APIs are required for new {product-title} on {GCP} cluster creation. For more information, see link:https://docs.redhat.com/en/documentation/openshift_dedicated/4/html/planning_your_environment/gcp-ccs#ccs-gcp-customer-procedure_gcp-ccs[Required customer procedure].
1014

modules/wif-configuration-update.adoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,10 @@ When you update a wif-config or create a new one, ensure your {cluster-manager}
3030
Error: failed to create wif-config: failed to create wif-config: status is 400, identifier is '400', code is 'CLUSTERS-MGMT-400', at '2025-10-06T15:18:37Z' and operation identifier is 'f9551d63-a58a-4e3c-b847-5f99ba1b0b74': Client version is out of date for WIF operations. Please update from vOCM-CLI/1.0.7 to v1.0.8 and try again.
3131
----
3232

33+
You can also update an existing {product-title} cluster that is already using WIF by adding a dedicated project to manage workload identity pools and providers using the `--federated-project` flag. This best-practice model separates the workload identity pools and providers into a dedicated, centralized {GCP} project.
34+
35+
When you update the configuration using the `--federated-project` flag, the federated identity pool moves to the new federated project you specify, while the existing IAM service accounts and custom roles remain in the original cluster-associated project.
36+
3337
.Procedure
3438
. To check the version of your `ocm`, run the following command:
3539
+
@@ -46,9 +50,11 @@ $ ocm version
4650
----
4751
ocm gcp update wif-config <wif_name> \ <1>
4852
--version <version> <2>
53+
--federated-project <gcp_project_id> <3>
4954
----
5055
<1> Replace `<wif_name>` with the name of the WIF configuration you want to update.
5156
<2> Optional: Replace `<version>` with the {product-title} y-stream version you plan to update the cluster to. If you do not specify a version, the wif-config will be updated to support the latest {product-title} y-stream version as well as the last three {product-title} supported y-stream versions (beginning with version 4.17).
57+
<3> Optional: Replace `<gcp_project_id>` with the ID of the dedicated project where the workload identity pools and providers will be created and managed. If the `--federated-project` flag is not specified, the workload identity pools and providers will remain in the project associated with the cluster.
5258

5359
.Next steps
5460

modules/wif-requirements.adoc

Lines changed: 0 additions & 31 deletions
This file was deleted.

osd_whats_new/osd-whats-new.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The default IAM permissions for WIF in the link:https://github.com/openshift/man
2727
** The `osd-deployer` service account no longer uses the `iam.serviceAccounts.signBlob` permission. This has been replaced with the `iam.serviceAccountTokenCreator` role, which is now specifically assigned to the service accounts that require it.
2828
** The `osd-deployer` service account no longer uses the `iam.serviceAccounts.actAs` permission. This has been replaced with the `iam.serviceAccountUser` role, which is now specifically assigned to the service accounts that require it.
2929

30-
If you have existing `wif-config` instances, you can get these new, less permissive permissions by running the `ocm gcp update wif-config` command. For more information, see xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#wif-configuration-update_osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Updating a WIF configuration].
30+
If you have existing `wif-config` instances, you can get these new, less permissive permissions by running the `ocm gcp update wif-config` command. For more information, see xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#wif-configuration-update_osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Updating a Workforce Identity Federation configuration].
3131

3232
* **Workload Identify Federation (WIF) is now the default authentication type for {product-title} clusters on {GCP}.**
3333
In alignment with the principle of least privilege as well as {gcp-full}'s preferred method of credential authentication, WIF is now the default authentication type when creating an {product-title} cluster on {GCP}. WIF greatly improves an {product-title} cluster's resilience against unauthorized access by using short-lived, least-privilege credentials and eliminating the need for static service account keys. For more information, see xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#creating-a-gcp-cluster-with-workload-identity-federation[Creating a cluster on {gcp-short} with Workload Identity Federation authentication].

0 commit comments

Comments
 (0)