Skip to content

Commit

Permalink
Merge pull request ceph#46024 from sirtoobii/patch-2
Browse files Browse the repository at this point in the history
doc/radosgw/STS: sts_key and user capabilities

Reviewed-by: Zac Dover <[email protected]>
  • Loading branch information
zdover23 authored Jul 28, 2022
2 parents f362941 + af730ab commit 89409d6
Show file tree
Hide file tree
Showing 2 changed files with 23 additions and 15 deletions.
26 changes: 17 additions & 9 deletions doc/radosgw/STS.rst
Original file line number Diff line number Diff line change
Expand Up @@ -92,20 +92,28 @@ STS Configuration

The following configurable options have to be added for STS integration::

[client.radosgw.gateway]
rgw sts key = {sts key for encrypting the session token}
rgw s3 auth use sts = true
[client.{your-rgw-name}]
rgw_sts_key = {sts key for encrypting the session token}
rgw_s3_auth_use_sts = true

Note: By default, STS and S3 APIs co-exist in the same namespace, and both S3
and STS APIs can be accessed via the same endpoint in Ceph Object Gateway.
Notes:

* By default, STS and S3 APIs co-exist in the same namespace, and both S3
and STS APIs can be accessed via the same endpoint in Ceph Object Gateway.
* The ``rgw_sts_key`` needs to be a hex-string consisting of exactly 16 characters.

Examples
========
1. In order to get the example to work, make sure that the user TESTER has the ``roles`` capability assigned:

.. code-block:: console
radosgw-admin caps add --uid="TESTER" --caps="roles=*"
1. The following is an example of AssumeRole API call, which shows steps to create a role, assign a policy to it
(that allows access to S3 resources), assuming a role to get temporary credentials and accessing s3 resources using
those credentials. In this example, TESTER1 assumes a role created by TESTER, to access S3 resources owned by TESTER,
according to the permission policy attached to the role.
2. The following is an example of AssumeRole API call, which shows steps to create a role, assign a policy to it
(that allows access to S3 resources), assuming a role to get temporary credentials and accessing s3 resources using
those credentials. In this example, TESTER1 assumes a role created by TESTER, to access S3 resources owned by TESTER,
according to the permission policy attached to the role.

.. code-block:: python
Expand Down
12 changes: 6 additions & 6 deletions doc/radosgw/STSLite.rst
Original file line number Diff line number Diff line change
Expand Up @@ -60,9 +60,9 @@ The above STS configurables can be used with the Keystone configurables if one
needs to use STS Lite in conjunction with Keystone. The complete set of
configurable options will be::

[client.radosgw.gateway]
rgw sts key = {sts key for encrypting/ decrypting the session token}
rgw s3 auth use sts = true
[client.{your-rgw-name}]
rgw_sts_key = {sts key for encrypting/ decrypting the session token, exactly 16 hex characters}
rgw_s3_auth_use_sts = true

rgw keystone url = {keystone server url:keystone server admin port}
rgw keystone admin project = {keystone admin project name}
Expand All @@ -81,9 +81,9 @@ The details of the integrating ldap with Ceph Object Gateway can be found here:

The complete set of configurables to use STS Lite with LDAP are::

[client.radosgw.gateway]
rgw sts key = {sts key for encrypting/ decrypting the session token}
rgw s3 auth use sts = true
[client.{your-rgw-name}]
rgw_sts_key = {sts key for encrypting/ decrypting the session token, exactly 16 hex characters}
rgw_s3_auth_use_sts = true

rgw_s3_auth_use_ldap = true
rgw_ldap_uri = {LDAP server to use}
Expand Down

0 comments on commit 89409d6

Please sign in to comment.