Skip to content

Commit e4a37fc

Browse files
committed
OSDOCS-16120 updated modules
1 parent 7b7cc38 commit e4a37fc

17 files changed

+761
-501
lines changed

_topic_maps/_topic_map.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1233,11 +1233,11 @@ Topics:
12331233
File: zero-trust-manager-configuration
12341234
- Name: Configuring Zero Trust Workload Identity Manager OIDC Federation
12351235
File: zero-trust-manager-oidc-federation
1236-
- Name: Monitoring Zero Trust Workload Identity Manager
1237-
File: zero-trust-manager-monitoring
12381236
- Name: Enabling create-only mode for the Zero Trust Workload Identity Manager
12391237
File: zero-trust-manager-reconciliation
1240-
- Name: Uninstalling Zero Trust Workload Identity Manager
1238+
- Name: Monitoring Zero Trust Workload Identity Manager
1239+
File: zero-trust-manager-monitoring
1240+
- Name: Uninstalling the Zero Trust Workload Identity Manager
12411241
File: zero-trust-manager-uninstall
12421242
- Name: External Secrets Operator for Red Hat OpenShift
12431243
Dir: external_secrets_operator
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * security/zero_trust_workload_identity_manageer/zero-trust-manager-oidc-federation.adoc
4+
5+
:_mod-docs-content-type: PROCEDURE
6+
[id="zero-trust-manager-configure-azure-blob_{context}"]
7+
= Configuring Azure blob storage
8+
9+
You need to create a new storage account to be used to store content.
10+
11+
.Procedure
12+
13+
. Create a new storage account that is used to store content by running the following command:
14+
+
15+
[source,terminal]
16+
----
17+
$ az storage account create \
18+
--name ${STORAGE_ACCOUNT} \
19+
--resource-group ${RESOURCE_GROUP} \
20+
--location ${LOCATION} \
21+
--encryption-services blob
22+
----
23+
24+
. Obtain the storage ID for the newly created storage account by running the following command:
25+
+
26+
[source,terminal]
27+
----
28+
$ export STORAGE_ACCOUNT_ID=$(az storage account show -n ${STORAGE_ACCOUNT} -g ${RESOURCE_GROUP} --query id --out tsv)
29+
----
30+
31+
. Create a storage container inside the newly created storage account to provide a location to support the storage of blobs by running the following command:
32+
+
33+
[source,terminal]
34+
----
35+
$ az storage container create \
36+
--account-name ${STORAGE_ACCOUNT} \
37+
--name ${STORAGE_CONTAINER} \
38+
--auth-mode login
39+
----
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * security/zero_trust_workload_identity_manageer/zero-trust-manager-oidc-federation.adoc
4+
5+
:_mod-docs-content-type: PROCEDURE
6+
[id="zero-trust-manager-configure-azure-identity_{context}"]
7+
= Configuring an Azure user managed identity
8+
9+
You need to Create a new User Managed Identity and then obtain the Client ID of the related Service Principal associated with the User Managed Identity.
10+
11+
.Procedure
12+
13+
. Create a new User Managed Identity and then obtain the Client ID of the related Service Principal associated with the User Managed Identity by running the following command:
14+
+
15+
[source,terminal]
16+
----
17+
$ az identity create \
18+
--name ${USER_ASSIGNED_IDENTITY_NAME} \
19+
--resource-group ${RESOURCE_GROUP}
20+
21+
$ export IDENTITY_CLIENT_ID=$(az identity show --resource-group "${RESOURCE_GROUP}" --name "${USER_ASSIGNED_IDENTITY_NAME}" --query 'clientId' -otsv)
22+
----
23+
24+
. Retrieve the `CLIENT_ID` of an Azure user-assigned managed identity and save it as an environment variable by running the following command:
25+
+
26+
[source,terminal]
27+
----
28+
$ export IDENTITY_CLIENT_ID=$(az identity show --resource-group "${RESOURCE_GROUP}" --name "${USER_ASSIGNED_IDENTITY_NAME}" --query 'clientId' -otsv)
29+
----
30+
31+
. Associate a role with the Service Principal associated with the User Managed Identity by running the following command:
32+
+
33+
[source,terminal]
34+
----
35+
$ az role assignment create \
36+
--role "Storage Blob Data Contributor" \
37+
--assignee "${IDENTITY_CLIENT_ID}" \
38+
--scope ${STORAGE_ACCOUNT_ID}
39+
----

0 commit comments

Comments
 (0)