Chapter 6. Google workload identity federation cloud authentication
Applications running outside Google Cloud use service account keys, such as usernames and passwords, to gain access to Google Cloud resources. These service account keys might become a security risk if they are not properly managed.
With Google’s workload identity federation, you can use Identity and Access Management (IAM) to offer IAM roles, including the ability to impersonate service accounts, to external identities. This eliminates the maintenance and security risks associated with service account keys.
Workload identity federation handles encrypting and decrypting certificates, extracting user attributes, and validation. Identity federation externalizes authentication, passing it over to Security Token Services (STS), and reduces the demands on individual developers. Authorization and controlling access to resources remain the responsibility of the application.
Google workload identity federation is available for OADP 1.3.x and later.
When backing up volumes, OADP on Google Cloud with Google workload identity federation authentication only supports CSI snapshots.
OADP on Google Cloud with Google workload identity federation authentication does not support Volume Snapshot Locations (VSL) backups. VSL backups finish with a PartiallyFailed phase when Google Cloud workload identity federation is configured.
If you do not use Google workload identity federation cloud authentication, continue to Installing the Data Protection Application.
Prerequisites
- You have installed a cluster in manual mode with Google Cloud Workload Identity configured.
-
You have access to the Cloud Credential Operator utility (
ccoctl) and to the associated workload identity pool.
Procedure
Create an
oadp-credrequestdirectory by running the following command:mkdir -p oadp-credrequest
$ mkdir -p oadp-credrequestCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create a
CredentialsRequest.yamlfile as following:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Use the
ccoctlutility to process theCredentialsRequestobjects in theoadp-credrequestdirectory by running the following command:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
manifests/openshift-adp-cloud-credentials-gcp-credentials.yamlfile is now available to use in the following steps.Create a namespace by running the following command:
oc create namespace <OPERATOR_INSTALL_NS>
$ oc create namespace <OPERATOR_INSTALL_NS>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Apply the credentials to the namespace by running the following command:
oc apply -f manifests/openshift-adp-cloud-credentials-gcp-credentials.yaml
$ oc apply -f manifests/openshift-adp-cloud-credentials-gcp-credentials.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow