Este conteúdo não está disponível no idioma selecionado.

Getting started with Red Hat OpenShift Service on AWS in AWS GovCloud


Red Hat OpenShift Service on AWS 4

Setting up clusters and accounts with GovCloud

Red Hat OpenShift Documentation Team

Abstract

This document provides information on how to get started with Red Hat OpenShift Service on AWS (ROSA) GovCloud.

Chapter 1. Getting started with Red Hat OpenShift Service on AWS in AWS GovCloud

This service is for use by federal and government agencies, or by commercial organizations and Federal Information Security Modernization Act (FISMA) research and development universities supporting a government contract or in the process of bidding on a government contract such as a request for proposal (RFP) or request for information (RFI) pre-bid stage.

Red Hat OpenShift Service on AWS in AWS GovCloud carries the following requirements:

  • Red Hat OpenShift Service on AWS in AWS GovCloud can only be deployed into an existing VPC. See Create Amazon VPC architecture for the AWS PrivateLink use case for instructions on setting up a VPC.
  • Red Hat OpenShift Service on AWS in AWS GovCloud only supports the use of the AWS STS credentials method.
  • Red Hat OpenShift Service on AWS in AWS GovCloud only uses Federal Information Processing Standards (FIPS) validated modules in process cryptographic libraries.
  • Red Hat OpenShift Service on AWS in AWS GovCloud requires a separate Red Hat account for use with FedRAMP, even if you already have an existing Red Hat account for Red Hat OpenShift Service on AWS clusters in commercial regions.

    • Each person who needs to be able to create, modify, or delete clusters must have their own Red Hat FedRAMP account.
    • Access to an existing cluster, to use that cluster, does not require a Red Hat FedRAMP account.
  • You can use your Red Hat FedRAMP account to deploy to multiple AWS GovCloud accounts.

1.1. Signing up for a Red Hat FedRAMP account

To access Red Hat OpenShift Service on AWS in AWS GovCloud, you must sign up for a Red Hat FedRAMP account.

Procedure

  1. Navigate to the ROSA GovCloud access request form.
  2. Complete the access request form.
  3. Click Submit to sign up. You receive a Submission confirmation.

    Red Hat’s confirmed stateside support team contacts you through email for the following information:

    • Admin details to include your organization name, administrator first and surname and administrator email.
    • User authentication option to the FedRAMP Hybrid Cloud Console from one of the following two options:

      • Local group in a Red Hat managed Keycloak instance, where users will be required to setup multifactor authentication (MFA) with an approved device.

        Note

        Only device YubiKEY 5C NFC FIPS currently accepted.

      • Customer managed Identity Provider (IdP), integrated via OpenID Connect (OIDC), where you will need to provide the following:

        • Discovery Endpoint: The IdP’s OIDC discovery URL (typically ending in /.well-known/openid-configuration). This allows Keycloak to automatically fetch most of the IdP’s settings.
        • Client ID and secret: Credentials that allow Keycloak to authenticate with the customer’s IdP.
        • Email domain(s): A list of approved email domains. Only users with an email address from one of these domains will be allowed to log in.
        • Essential claim: A specific key-value pair (e.g., "rh-approved": "true") that must be present in a user’s token from the IdP to grant them access. In this configuration, the customer takes on the responsibility for implementing FIPS 140-2 validated MFA.

Chapter 2. Managing your Red Hat OpenShift Service on AWS in AWS GovCloud account

When you have access to the FedRAMP accounts, you can manage the credentials according to your needs.

2.1. Changing your Red Hat FedRAMP account password

To change your FedRAMP account password, you must have access to your Red Hat FedRAMP account.

Procedure

  1. Navigate to the Red Hat FedRAMP account management page.
  2. Sign in with your current username and password.
  3. Under the middle box called Account Security, click Signing In.
  4. Under Basic authentication, select Password.
  5. Click Update and choose a password that meets the following requirements:

    • Minimum of fifteen (15) characters
    • At least one (1) upper-case letter
    • At least one (1) lower-case letter
    • At least one (1) number
    • At least one (1) special character (e.g. ~ ! @ # $ % ^ & * ( ) _ + = - ' [ ] / ? > <)
  6. Confirm your password.
  7. Click Submit.

2.2. Opening a support ticket

To get access to open a support ticket, complete the following steps.

Procedure

  1. If you need to create an account, contact fedramp-css@openshiftusgov.com.
  2. After you receive access, navigate to the Red Hat GovCloud support portal.
  3. Click Create Case and complete the required information.
  4. Click Submit.

Chapter 3. Installing a Red Hat OpenShift Service on AWS cluster in AWS GovCloud

You can install a Red Hat OpenShift Service on AWS cluster in AWS GovCloud with or without AWS PrivateLink. Before you begin, ensure that you meet the requirements to access AWS GovCloud, you have prepared to access Red Hat OpenShift Service on AWS in AWS GovCloud, and you have signed up for a Red Hat FedRAMP account.

3.1. Preparing to deploy a Red Hat OpenShift Service on AWS cluster in AWS GovCloud

To deploy a Red Hat OpenShift Service on AWS cluster in AWS GovCloud, you must be logged in to your Red Hat FedRAMP account.

Prerequisites

  • You have configured your AWS CLI to use GovCloud.
  • You are logged into your government region.

Procedure

  1. Navigate to https://console.openshiftusgov.com/openshift/token.
  2. Sign in with your Red Hat FedRAMP account credentials where you will see a screen with your token.
  3. Copy your token for the next step.
  4. In your terminal:

    1. Run rosa login and paste your copied token to log in to the service.

      $ rosa login --govcloud --token=<TOKEN>
      Note

      Depending on your AWS CLI configuration, you might need to add a government region to the end of the command string, such as --region us-gov-west-1.

    2. Run rosa whoami to confirm all information is correct ensuring that you are using the AWS Gov region and the Red Hat OpenShift Cluster Manager API is “https://api.openshiftusgov.com”..

      $ rosa whoami

      Example output

      AWS ARN:                                 arn:aws-us-gov:iam::00000000000:user/rosa-gov-user
      AWS Account ID:                       00000000000
      AWS Default Region:                 us-gov-east-1
      OCM API:                                   https://api.openshiftusgov.com
      OCM Account Email:                  rosa-gov-user@redhat.com
      OCM Account ID:                       3ZXXXXXXXXXXXXXXXXXXXXXXXXX
      OCM Account Name:                 Rosa Gov
      OCM Account Username:          rosa-gov-user
      OCM Organization External ID:  rosa-gov-user
      OCM Organization ID:                3ZXXXXXXXXXXXXXXXXXXXXXXXXX
      OCM Organization Name:          rosa-gov-user

  5. You must create a VPC where Red Hat OpenShift Service on AWS will be deployed. For instructions on setting up a VPC, see Amazon VPC architecture for the AWS PrivateLink use case.

Legal Notice

Copyright © Red Hat

OpenShift documentation is licensed under the Apache License 2.0 (https://www.apache.org/licenses/LICENSE-2.0).

Modified versions must remove all Red Hat trademarks.

Portions adapted from https://github.com/kubernetes-incubator/service-catalog/ with modifications by Red Hat.

Red Hat, Red Hat Enterprise Linux, the Red Hat logo, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.

Linux® is the registered trademark of Linus Torvalds in the United States and other countries.

Java® is a registered trademark of Oracle and/or its affiliates.

XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.

MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.

Node.js® is an official trademark of the OpenJS Foundation.

The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation’s permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.

All other trademarks are the property of their respective owners.

Red Hat logoGithubredditYoutubeTwitter

Aprender

Experimente, compre e venda

Comunidades

Sobre a documentação da Red Hat

Ajudamos os usuários da Red Hat a inovar e atingir seus objetivos com nossos produtos e serviços com conteúdo em que podem confiar. Explore nossas atualizações recentes.

Tornando o open source mais inclusivo

A Red Hat está comprometida em substituir a linguagem problemática em nosso código, documentação e propriedades da web. Para mais detalhes veja o Blog da Red Hat.

Sobre a Red Hat

Fornecemos soluções robustas que facilitam o trabalho das empresas em plataformas e ambientes, desde o data center principal até a borda da rede.

Theme

© 2026 Red Hat
Voltar ao topo