Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 2. Creating a cluster on Google Cloud with Workload Identity Federation authentication
2.1. Workload Identity Federation overview
Workload Identity Federation (WIF) is a Google Cloud Identity and Access Management (IAM) feature that provides third parties a secure method to access resources on a customer’s cloud account. WIF eliminates the need for service account keys, and is Google Cloud’s preferred method of credential authentication.
While service account keys can provide powerful access to your Google Cloud resources, they must be maintained by the user and can be a security risk if they are not managed properly. WIF does not use service keys as an access method for your Google cloud resources. Instead, WIF grants access by using credentials from external identity providers to generate short-lived credentials for workloads. The workloads can then use these credentials to temporarily impersonate service accounts and access Google Cloud resources. This removes the burden of having to properly maintain service account keys, and removes the risk of unauthorized users gaining access to service account keys.
The following bulleted items provides a basic overview of the Workload Identity Federation process:
- The owner of the Google Cloud project configures a workload identity pool with an identity provider, allowing OpenShift Dedicated to access the project’s associated service accounts using short-lived credentials.
- This workload identity pool is configured to authenticate requests using an Identity Provider (IP) that the user defines.
- For applications to get access to cloud resources, they first pass credentials to Google’s Security Token Service (STS). STS uses the specified identity provider to verify the credentials.
- Once the credentials are verified, STS returns a temporary access token to the caller, giving the application the ability to impersonate the service account bound to that identity.
Operators also need access to cloud resources. By using WIF instead of service account keys to grant this access, cluster security is further strengthened, as service account keys are no longer stored in the cluster. Instead, operators are given temporary access tokens that impersonate the service accounts. These tokens are short-lived and regularly rotated.
For more information about Workload Identity Federation, see the Google Cloud documentation.
Workload Identity Federation (WIF) is only available on OpenShift Dedicated version 4.17 and later, and is only supported by the Customer Cloud Subscription (CCS) infrastructure type.
2.2. Prerequisites
You must complete the following prerequisites before Creating a Workload Identity Federation cluster using OpenShift Cluster Manager and Creating a Workload Identity Federation cluster using the OCM CLI.
- You have confirmed your Google Cloud account has the necessary resource quotas and limits to support your desired cluster size according to the cluster resource requirements. Note- For more information regarding resource quotas and limits, see Additional resources. 
- You have reviewed the introduction to OpenShift Dedicated and the documentation on architecture concepts.
- You have reviewed the OpenShift Dedicated cloud deployment options.
- You have read and completed the Required customer procedure.
WIF supports the deployment of a private OpenShift Dedicated on Google Cloud cluster with Private Service Connect (PSC). Red Hat recommends using PSC when deploying private clusters. For more information about the prerequisites for PSC, see Prerequisites for Private Service Connect.
2.3. Creating a Workload Identity Federation cluster using OpenShift Cluster Manager
Procedure
- Log in to OpenShift Cluster Manager and click Create cluster on the OpenShift Dedicated card.
- Under Billing model, configure the subscription type and infrastructure type. - Select a subscription type. For information about OpenShift Dedicated subscription options, see Cluster subscriptions and registration in the OpenShift Cluster Manager documentation.
- Select the Customer cloud subscription infrastructure type.
- Click Next.
 
- Select Run on Google Cloud.
- Select Workload Identity Federation as the Authentication type. Note- Workload Identity Federation (WIF), Google Cloud’s recommended method of authentication, is the default authentication type of OpenShift Dedicated installation. It greatly improves a cluster’s resilience by using short-lived, least-privilege credentials and eliminates the need for static service account keys. - Read and complete all the required prerequisites.
- Click the checkbox indicating that you have read and completed all the required prerequisites.
 
- To create a new WIF configuration, open a terminal window and run the following OCM CLI command. - ocm gcp create wif-config --name <wif_name> \ --project <gcp_project_id> \ --version <osd_version> - $ ocm gcp create wif-config --name <wif_name> \- 1 - --project <gcp_project_id> \- 2 - --version <osd_version>- 3 - --federated-project <gcp_project_id>- 4 - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Replace<wif_name>with the name of your WIF configuration.
- 2
- Replace<gcp_project_id>with the ID of the Google Cloud project where the WIF configuration will be implemented.
- 3
- Optional: Replace<osd_version>with the desired OpenShift Dedicated version the wif-config will need to support. If you do not specify a version, the wif-config will support the latest OpenShift Dedicated y-stream version as well as the last three supported OpenShift Dedicated y-stream versions (beginning with version 4.17).
- 4
- Optional: Replace<gcp_project_id>with the ID of the dedicated project where the workload identity pools and providers will be created and managed. If--federated-projectis not specified, the workload identity pools and providers will be created and managed in the project specified by the--project flag.
 
- Select a configured WIF configuration from the WIF configuration drop-down list. If you want to select the WIF configuration you created in the last step, click Refresh first.
- Click Next.
- On the Details page, provide a name for your cluster and specify the cluster details: - In the Cluster name field, enter a name for your cluster.
- Optional: Cluster creation generates a domain prefix as a subdomain for your provisioned cluster on - openshiftapps.com. If the cluster name is less than or equal to 15 characters, that name is used for the domain prefix. If the cluster name is longer than 15 characters, the domain prefix is randomly generated as a 15-character string.- To customize the subdomain prefix, select the Create custom domain prefix checkbox, and enter your domain prefix name in the Domain prefix field. The domain prefix cannot be longer than 15 characters, must be unique within your organization, and cannot be changed after cluster creation. 
- Select a cluster version from the Version drop-down menu. Note- Workload Identity Federation (WIF) is only supported on OpenShift Dedicated version 4.17 and later. 
- Select a cloud provider region from the Region drop-down menu.
- Select a Single zone or Multi-zone configuration.
- Optional: Select Enable Secure Boot support for Shielded VMs to use Shielded VMs when installing your cluster. Once you create your cluster, the Enable Secure Boot support for Shielded VMs setting cannot be changed. For more information, see Shielded VMs. Important- To successfully create a cluster, you must select Enable Secure Boot support for Shielded VMs if your organization has the policy constraint - constraints/compute.requireShieldedVmenabled. For more information regarding Google Cloud organizational policy constraints, see Organization policy constraints.Important- Enable Secure Boot support for Shielded VMs is not supported for OpenShift Dedicated on Google Cloud clusters created using bare-metal instance types. For more information, see Limitations in the Google Cloud documentation. 
- Leave Enable user workload monitoring selected to monitor your own projects in isolation from Red Hat Site Reliability Engineer (SRE) platform metrics. This option is enabled by default.
 
- Optional: Expand Advanced Encryption to make changes to encryption settings. - Select Use custom KMS keys to use custom KMS keys. If you prefer not to use custom KMS keys, leave the default setting Use default KMS Keys.
- With Use Custom KMS keys selected: - Select a key ring location from the Key ring location drop-down menu.
- Select a key ring from the Key ring drop-down menu.
- Select a key name from the Key name drop-down menu.
- Provide the KMS Service Account.
 
- Optional: Select Enable FIPS cryptography if you require your cluster to be FIPS validated. Note- If Enable FIPS cryptography is selected, Enable additional etcd encryption is enabled by default and cannot be disabled. You can select Enable additional etcd encryption without selecting Enable FIPS cryptography. 
- Optional: Select Enable additional etcd encryption if you require etcd key value encryption. With this option, the etcd key values are encrypted, but not the keys. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in OpenShift Dedicated clusters by default. Note- By enabling etcd encryption for the key values in etcd, you incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Consider enabling etcd encryption only if you specifically require it for your use case. 
 
- Click Next.
- On the Machine pool page, select a Compute node instance type and a Compute node count. The number and types of nodes that are available depend on your OpenShift Dedicated subscription. If you are using multiple availability zones, the compute node count is per zone.
- Optional: Expand Add node labels to add labels to your nodes. Click Add additional label to add more node labels. Important- This step refers to labels within Kubernetes, not Google Cloud. For more information regarding Kubernetes labels, see Labels and Selectors. 
- Click Next.
- In the Cluster privacy dialog, select Public or Private to use either public or private API endpoints and application routes for your cluster. If you select Private, Use Private Service Connect is selected by default, and cannot be disabled. Private Service Connect (PSC) is Google Cloud’s security-enhanced networking feature.
- Optional: To install the cluster in an existing Google Cloud Virtual Private Cloud (VPC): - Select Install into an existing VPC. Important- Private Service Connect is supported only with Install into an existing VPC. 
- If you are installing into an existing VPC and you want to enable an HTTP or HTTPS proxy for your cluster, select Configure a cluster-wide proxy. Important- In order to configure a cluster-wide proxy for your cluster, you must first create the Cloud network address translation (NAT) and a Cloud router. See the Additional resources section for more information. 
 
- Accept the default application ingress settings, or to create your own custom settings, select Custom Settings. - Optional: Provide route selector.
- Optional: Provide excluded namespaces.
- Select a namespace ownership policy.
- Select a wildcard policy. - For more information about custom application ingress settings, click on the information icon provided for each setting. 
 
- Click Next.
- Optional: To install the cluster into a Google Cloud Shared VPC, follow these steps. Note- Installing a new OpenShift Dedicated cluster into a VPC that was automatically created by the installer for a different cluster is not supported. Important- The VPC owner of the host project must enable a project as a host project in their Google Cloud console and add the Computer Network Administrator, Compute Security Administrator, and DNS Administrator roles to the following service accounts before cluster installation: - osd-deployer
- osd-control-plane
- openshift-machine-api-gcp
 - Failure to do so will cause the cluster go into the "Installation Waiting" state. If this occurs, you must contact the VPC owner of the host project to assign the roles to the service accounts listed above. The VPC owner of the host project has 30 days to grant the listed permissions before the cluster creation fails. For more information, see Enable a host project and Provision Shared VPC. - Select Install into Google Cloud Shared VPC.
- Specify the Host project ID. If the specified host project ID is incorrect, cluster creation fails.
- If you opted to install the cluster in an existing Google Cloud VPC, provide your Virtual Private Cloud (VPC) subnet settings and select Next. You must have created the Cloud network address translation (NAT) and a Cloud router. See Additional resources for information about Cloud NATs and Google VPCs. Note- If you are installing a cluster into a Shared VPC, the VPC name and subnets are shared from the host project. 
 
- Click Next.
- If you opted to configure a cluster-wide proxy, provide your proxy configuration details on the Cluster-wide proxy page: - Enter a value in at least one of the following fields: - Specify a valid HTTP proxy URL.
- Specify a valid HTTPS proxy URL.
- 
										In the Additional trust bundle field, provide a PEM encoded X.509 certificate bundle. The bundle is added to the trusted certificate store for the cluster nodes. An additional trust bundle file is required if you use a TLS-inspecting proxy unless the identity certificate for the proxy is signed by an authority from the Red Hat Enterprise Linux CoreOS (RHCOS) trust bundle. This requirement applies regardless of whether the proxy is transparent or requires explicit configuration using the http-proxyandhttps-proxyarguments.
 
- Click Next. - For more information about configuring a proxy with OpenShift Dedicated, see Configuring a cluster-wide proxy. 
 
- In the CIDR ranges dialog, configure custom classless inter-domain routing (CIDR) ranges or use the defaults that are provided. Important- CIDR configurations cannot be changed later. Confirm your selections with your network administrator before proceeding. - If the cluster privacy is set to Private, you cannot access your cluster until you configure private connections in your cloud provider. 
- On the Cluster update strategy page, configure your update preferences: - Choose a cluster update method: - Select Individual updates if you want to schedule each update individually. This is the default option.
- Select Recurring updates to update your cluster on your preferred day and start time, when updates are available. Note- You can review the end-of-life dates in the update lifecycle documentation for OpenShift Dedicated. For more information, see OpenShift Dedicated update life cycle. 
 
- Provide administrator approval based on your cluster update method: - Individual updates: If you select an update version that requires approval, provide an administrator’s acknowledgment and click Approve and continue.
- Recurring updates: If you selected recurring updates for your cluster, provide an administrator’s acknowledgment and click Approve and continue. OpenShift Cluster Manager does not start scheduled y-stream updates for minor versions without receiving an administrator’s acknowledgment.
 
- If you opted for recurring updates, select a preferred day of the week and upgrade start time in UTC from the drop-down menus.
- Optional: You can set a grace period for Node draining during cluster upgrades. A 1 hour grace period is set by default.
- Click Next. Note- In the event of critical security concerns that significantly impact the security or stability of a cluster, Red Hat Site Reliability Engineering (SRE) might schedule automatic updates to the latest z-stream version that is not impacted. The updates are applied within 48 hours after customer notifications are provided. For a description of the critical impact security rating, see Understanding Red Hat security ratings. 
 
- Review the summary of your selections and click Create cluster to start the cluster installation. The installation takes approximately 30-40 minutes to complete.
- Optional: On the Overview tab, you can enable the delete protection feature by selecting Enable, which is located directly under Delete Protection: Disabled. This will prevent your cluster from being deleted. To disable delete protection, select Disable. By default, clusters are created with the delete protection feature disabled.
Verification
- You can monitor the progress of the installation in the Overview page for your cluster. You can view the installation logs on the same page. Your cluster is ready when the Status in the Details section of the page is listed as Ready.
If your cluster deployment fails during installation, certain resources created during the installation process are not automatically removed from your Google Cloud account. To remove these resources from your Google Cloud account, you must delete the failed cluster.
2.4. Creating a Workload Identity Federation cluster using the OCM CLI
				You can create an OpenShift Dedicated on Google Cloud cluster with Workload Identity Federation (WIF) using the OpenShift Cluster Manager CLI (ocm) in interactive or non-interactive mode.
			
					Download the latest version of the OpenShift Cluster Manager CLI (ocm) for your operating system from the Downloads page on OpenShift Cluster Manager.
				
					OpenShift Cluster Manager API command-line interface (ocm) is a Developer Preview feature only. For more information about the support scope of Red Hat Developer Preview features, see Developer Preview Support Scope.
				
Before creating the cluster, you must first create a WIF configuration.
Migrating an existing non-WIF cluster to a WIF configuration is not supported. This feature can only be enabled during new cluster creation.
2.4.1. Creating a WIF configuration
Procedure
						You can create a WIF configuration using the auto mode or the manual mode.
					
					The auto mode enables you to automatically create the service accounts for OpenShift Dedicated components as well as other IAM resources.
				
					Alternatively, you can use the manual mode. In manual mode, you are provided with commands within a script.sh file which you use to manually create the service accounts for OpenShift Dedicated components as well as other IAM resources.
				
- Based on your mode preference, run one of the following commands to create a WIF configuration: - Create a WIF configuration in auto mode by running the following command: - ocm gcp create wif-config --name <wif_name> \ --project <gcp_project_id> \ --version <osd_version> - $ ocm gcp create wif-config --name <wif_name> \- 1 - --project <gcp_project_id> \- 2 - --version <osd_version>- 3 - --federated-project <gcp_project_id>- 4 - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Replace<wif_name>with the name of your WIF configuration.
- 2
- Replace<gcp_project_id>with the ID of the Google Cloud project where the WIF configuration will be implemented.
- 3
- Optional: Replace<osd_version>with the desired OpenShift Dedicated version the wif-config will need to support. If you do not specify a version, the wif-config will support the latest OpenShift Dedicated y-stream version as well as the last three supported OpenShift Dedicated y-stream versions (beginning with version 4.17).
- 4
- Optional: Replace<gcp_project_id>with the ID of the dedicated project where the workload identity pools and providers will be created and managed. If the--federated-projectflag is not specified, the workload identity pools and providers will be created and managed in the project specified by the--projectflag.
 
 Note- Using a dedicated project to create and manage workload identity pools and providers is recommended by Google Cloud. Using a dedicated project helps you to establish centralized governance over the configuration of workload identity pools and providers, enforce uniform attribute mappings and conditions throughout all projects and applications, and ensure that only authorized identity providers can authenticate with WIF. - For more information, see Use a dedicated project to manage workload identity pools and providers. - + Important- Creating and managing workload identity pools and providers in a dedicated project is only allowed during initial WIF configuration creation. The - --federated-projectflag cannot be applied to existing- wif-configs.- + - Example output - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - + - Create a WIF configuration in manual mode by running the following command: - ocm gcp create wif-config --name <wif_name> \ --project <gcp_project_id> \ --mode=manual - $ ocm gcp create wif-config --name <wif_name> \- 1 - --project <gcp_project_id> \- 2 - --mode=manual- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Once the WIF is configured, the following service accounts, roles, and groups are created. Note- Red Hat custom roles are versioned with every OpenShift y-stream release, for example 4.19. - Expand - Table 2.1. WIF configuration service accounts, group and roles - Service Account/Group - Google Cloud pre-defined roles and Red Hat custom roles - osd-deployer - osd_deployer_v<y-stream-version> - osd-control-plane - compute.instanceAdmin
- compute.networkAdmin
- compute.securityAdmin
- compute.storageAdmin
 - osd-worker - compute.storageAdmin
- compute.viewer
 - cloud-credential-operator-gcp-ro-creds - cloud_credential_operator_gcp_ro_creds_v<y-stream-version> - openshift-cloud-network-config-controller-gcp - openshift_cloud_network_config_controller_gcp_v<y-stream-version> - openshift-gcp-ccm - openshift_gcp_ccm_v<y-stream-version> - openshift-gcp-pd-csi-driver-operator - compute.storageAdmin
- iam.serviceAccountUser
- resourcemanager.tagUser
- openshift_gcp_pd_csi_driver_operator_v<y-stream-version>
 - openshift-image-registry-gcp - openshift_image_registry_gcs_v<y-stream-version> - openshift-ingress-gcp - openshift_ingress_gcp_v<y-stream-version> - openshift-machine-api-gcp - openshift_machine_api_gcp_v<y-stream-version> - Access via SRE group:sd-sre-platform-gcp-access - sre_managed_support 
 
For the complete list of WIF configuration roles and their assigned permissions, see managed-cluster-config.
2.4.2. Creating a WIF cluster
Procedure
						You can create a WIF cluster using the interactive mode or the non-interactive mode.
					
					In interactive mode, cluster attributes are displayed automatically as prompts during the creation of the cluster. You enter the values for those prompts based on specified requirements in the fields provided.
				
					In non-interactive mode, you specify the values for specific parameters within the command.
				
- Based on your mode preference, run one of the following commands to create an OpenShift Dedicated cluster on Google Cloud with WIF configuration: - Create a cluster in interactive mode by running the following command: - ocm create cluster --interactive - $ ocm create cluster --interactive- 1 - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- interactivemode enables you to specify configuration options at the interactive prompts.
 
- Create a cluster in non-interactive mode by running the following command: Note- The following example is made up optional and required parameters and may differ from your - non-interactivemode command. Parameters not identified as optional are required. For additional details about these and other parameters, run the- ocm create cluster --help flagcommand in you terminal window.- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Replace<cluster_name>with a name for your cluster.
- 2
- Set value togcp.
- 3
- Set value totrue.
- 4
- Replace<wif_name>with the name of your WIF configuration.
- 5
- Replace<gcp_region>with the Google Cloud region where the new cluster will be deployed.
- 6
- Optional: The subscription billing model for the cluster.
- 7
- Optional: If you provided a value ofmarketplace-gcpfor thesubscription-typeparameter,marketplace-gcp-termsmust be equal totrue.
- 8
- Optional: The desired OpenShift Dedicated version.
- 9
- Optional: Deploy to multiple data centers.
- 10
- Optional: Enable autoscaling of compute nodes.
- 11
- Optional: Minimum number of compute nodes.
- 12
- Optional: Maximum number of compute nodes.
- 13
- Optional: Secure Boot enables the use of Shielded VMs in the Google Cloud.
- 14
- Optional: Replace<channel_group_name>with the name of the channel group you want to assign the cluster to. Channel group options includestableandeus.
 
 
If an OpenShift Dedicated version is specified, the version must also be supported by the assigned WIF configuration. If a version is specified that is not supported by the assigned WIF configuration, cluster creation will fail. If this occurs, update the assigned WIF configuration to the desired version or create a new WIF configuration with the desired version in the --version <osd_version> field.
If your cluster deployment fails during installation, certain resources created during the installation process are not automatically removed from your Google Cloud account. To remove these resources from your Google Cloud account, you must delete the failed cluster.
2.4.3. Listing WIF clusters
To list all of your OpenShift Dedicated clusters that have been deployed using the WIF authentication type, run the following command:
ocm list clusters --parameter search="gcp.authentication.wif_config_id != ''"
$ ocm list clusters --parameter search="gcp.authentication.wif_config_id != ''"To list all of your OpenShift Dedicated clusters that have been deployed using a specific wif-config, run the following command:
ocm list clusters --parameter search="gcp.authentication.wif_config_id = '<wif_config_id>'"
$ ocm list clusters --parameter search="gcp.authentication.wif_config_id = '<wif_config_id>'" - 1
- Replace<wif_config_id>with the ID of the WIF configuration.
2.4.4. Updating a WIF configuration
Updating a WIF configuration is only applicable for y-stream updates. For an overview of the update process, including details regarding version semantics, see The Ultimate Guide to OpenShift Release and Upgrade Process for Cluster Administrators.
Before upgrading a WIF-enabled OpenShift Dedicated cluster to a newer version, you must update the wif-config to that version as well. If you do not update the wif-config version before attempting to upgrade the cluster version, the cluster version upgrade will fail.
					As part of Red Hat’s ongoing commitment to the principle of least privilege, certain permissions previously assigned to the osd-deployer service account in WIF configurations have been removed. These changes help enhance the security of your clusters by ensuring that service accounts have only the permissions they need to perform their functions.
				
For the complete list of WIF configuration roles and their assigned permissions, see managed-cluster-config.
					To align your existing WIF configurations with these updated permissions, you can run the ocm gcp update wif-config command. This command updates the WIF configuration to include the latest permissions and roles required for optimal operation.
				
					When you update a wif-config or create a new one, ensure your OpenShift Cluster Manager CLI (ocm) is up to date. Not updating to the latest version of the ocm can result in error messages and service disruptions.
				
Example output
Error: failed to create wif-config: failed to create wif-config: status is 400, identifier is '400', code is 'CLUSTERS-MGMT-400', at '2025-10-06T15:18:37Z' and operation identifier is 'f9551d63-a58a-4e3c-b847-5f99ba1b0b74': Client version is out of date for WIF operations. Please update from vOCM-CLI/1.0.7 to v1.0.8 and try again.
Error: failed to create wif-config: failed to create wif-config: status is 400, identifier is '400', code is 'CLUSTERS-MGMT-400', at '2025-10-06T15:18:37Z' and operation identifier is 'f9551d63-a58a-4e3c-b847-5f99ba1b0b74': Client version is out of date for WIF operations. Please update from vOCM-CLI/1.0.7 to v1.0.8 and try again.Procedure
- To check the version of your - ocm, run the following command:- ocm version - $ ocm version- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- 
							Optional: If your ocmversion is not the latest available, download and install the latest version from the Downloads page on OpenShift Cluster Manager.
- Update a wif-config to a specific OpenShift Dedicated version by running the following command: - ocm gcp update wif-config <wif_name> \ --version <version> - ocm gcp update wif-config <wif_name> \- 1 - --version <version>- 2 - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Replace<wif_name>with the name of the WIF configuration you want to update.
- 2
- Optional: Replace<version>with the OpenShift Dedicated y-stream version you plan to update the cluster to. If you do not specify a version, the wif-config will be updated to support the latest OpenShift Dedicated y-stream version as well as the last three OpenShift Dedicated supported y-stream versions (beginning with version 4.17).
 
2.4.5. Removing stale permissions from service accounts managed by a WIF configuration
					The stale set of permissions previously assigned to the osd-deployer service account will remain on the account after updating the wif-config. You need to manually access the roles and remove these stale permissions from them.
				
2.4.5.1. Removing stale deployer permissions from service accounts managed by a WIF configuration
To remove the stale deployer permissions, run the following commands on a terminal with access to the Google Cloud project hosting the service accounts.
Procedure
- Retrieve the existing role definition, ensuring the - PROJECT_IDenvironment variable points to your Google Cloud project:- gcloud iam roles describe \ osd_deployer_v4.18 \ --project $PROJECT_ID \ --format=yaml > /tmp/role.yaml - $ gcloud iam roles describe \ osd_deployer_v4.18 \ --project $PROJECT_ID \ --format=yaml > /tmp/role.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Remove the unwanted permissions. You can do this by filtering out the unwanted permissions from the role definition file and saving the updated definition to a new file: - cat /tmp/role.yaml | \ grep -v "resourcemanager.projects.setIamPolicy" | \ grep -v "resourcemanager.projects.setIamPolicy" | \ grep -v "iam.serviceAccounts.signBlob" | \ grep -v "iam.serviceAccounts.signBlob" | \ grep -v "iam.serviceAccounts.actAs" > /tmp/updated_role.yaml grep -v "iam.serviceAccounts.actAs" > /tmp/updated_role.yaml - $ cat /tmp/role.yaml | \ grep -v "resourcemanager.projects.setIamPolicy" | \ grep -v "iam.serviceAccounts.signBlob" | \ grep -v "iam.serviceAccounts.actAs" > /tmp/updated_role.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Review the changes in the output between the original and updated role definitions to ensure only the unwanted permissions have been removed: - diff /tmp/role.yaml /tmp/updated_role.yaml - $ diff /tmp/role.yaml /tmp/updated_role.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Update the role in Google Cloud with the updated role definition file, ensuring the - PROJECT_IDenvironment variable points to your Google Cloud project:- gcloud iam roles update \ osd_deployer_v4.18 \ --project=$PROJECT_ID \ --file=/tmp/updated_role.yaml - $ gcloud iam roles update \ osd_deployer_v4.18 \ --project=$PROJECT_ID \ --file=/tmp/updated_role.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
2.4.5.2. Removing stale support permissions from service accounts managed by a WIF configuration
To remove stale support permissions, run the following commands on a terminal with access to the Google Cloud project hosting the service accounts.
Procedure
- Retrieve the existing role defintion, ensuring the - PROJECT_IDenvironment variable points to your Google Cloud project:- gcloud iam roles describe sre_managed_support --project $PROJECT_ID --format=yaml > /tmp/role.yaml - $ gcloud iam roles describe sre_managed_support --project $PROJECT_ID --format=yaml > /tmp/role.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Remove the unwanted permissions. You can do this by filtering out the unwanted permissions from the role definition file and saving the updated definition to a new file: - cat /tmp/role.yaml | grep -v "compute.firewalls.create" > /tmp/updated_role.yaml - $ cat /tmp/role.yaml | grep -v "compute.firewalls.create" > /tmp/updated_role.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Review the changes in the output between the original and updated role definitions to ensure only the unwanted permissions have been removed: - diff /tmp/role.yaml /tmp/updated_role.yaml - $ diff /tmp/role.yaml /tmp/updated_role.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Update the role in Google Cloud with the updated role definition file, ensuring the - PROJECT_IDenvironment variable points to your Google Cloud project:- gcloud iam roles update sre_managed_support --project $PROJECT_ID --file=/tmp/updated_role.yaml - $ gcloud iam roles update sre_managed_support --project $PROJECT_ID --file=/tmp/updated_role.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
2.4.6. Verifying a WIF configuration
					You can verify that the configuration of resources associated with a WIF configuration are correct by running the ocm gcp verify wif-config command. If a misconfiguration is found, the output provides details about the misconfiguration and recommends that you update the WIF configuration.
				
You need the name and ID of the WIF configuration you want to verify before verification. To obtain the name and ID of your active WIF configurations, run the following command:
ocm gcp list wif-configs
$ ocm gcp list wif-configsTo determine if the WIF configuration you want to verify is configured correctly, run the following command:
ocm gcp verify wif-config <wif_config_name>|<wif_config_id>
$ ocm gcp verify wif-config <wif_config_name>|<wif_config_id> - 1
- Replace<wif_config_name>and<wif_config_id>with the name and ID of your WIF configuration, respectively.
Example output
Error: verification failed with error: missing role 'compute.storageAdmin'. Running 'ocm gcp update wif-config' may fix errors related to cloud resource misconfiguration. exit status 1.
Error: verification failed with error: missing role 'compute.storageAdmin'.
Running 'ocm gcp update wif-config' may fix errors related to cloud resource misconfiguration.
exit status 1.2.5. Additional resources
- For information about OpenShift Dedicated clusters using a Customer Cloud Subscription (CCS) model on Google Cloud, see Customer requirements.
- For information about resource quotas, Resource quotas per project.
- For information about limits, Google Cloud account limits.
- For information about required APIs, see Required customer procedure.
- For information about managing workload identity pools, see Manage workload identity pools and providers.
- For information about managing roles and permissions in your Google Cloud account, see Roles and permissions.
- For a list of the supported maximums, see Cluster maximums.
- For information about configuring identity providers, see Configuring identity providers.
- For information about revoking cluster privileges, see Revoking privileges and access to an OpenShift Dedicated cluster.