Skip to content

OSDOCS-14108: Review-Authentication & Authorization #96304

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jul 25, 2025

Conversation

jneczypor
Copy link
Contributor

@jneczypor jneczypor commented Jul 17, 2025

OSDOCS-14108: Review-Authentication & Authorization
Name change NOT included. This can be picked up in the pruning tasks.

Version(s):
4.19+

Issue:
https://issues.redhat.com/browse/OSDOCS-14108

Link to docs preview:
Overview: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/
Understanding: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/understanding-authentication
Managing: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/managing-oauth-access-tokens
Configuring IDP: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/sd-configuring-identity-providers
Using RBAC: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/using-rbac
Understanding service accounts: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/understanding-and-creating-service-accounts
Using Service accounts: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/using-service-accounts-in-applications
Service account as OAuth: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/using-service-accounts-as-oauth-client
Assuming AWS IAM role: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/assuming-an-aws-iam-role-for-a-service-account
Scoping tokens: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/tokens-scoping
Using bound service tokens: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/bound-service-account-tokens
Managing security context: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/managing-security-context-constraints
Pod security: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/understanding-and-managing-pod-security-admission
Syncing LDAP groups: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/ldap-syncing

QE review:
No QE needed.

Additional information:

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Jul 17, 2025
@openshift-ci-robot
Copy link

openshift-ci-robot commented Jul 17, 2025

@jneczypor: This pull request references OSDOCS-14108 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.20.0" version, but no target version was set.

In response to this:

OSDOCS-14108: Review-Authentication & Authorization

Version(s):
4.19+

Issue:
https://issues.redhat.com/browse/OSDOCS-14108

Link to docs preview:

QE review:

  • QE has approved this change.

Additional information:

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

1 similar comment
@openshift-ci-robot
Copy link

openshift-ci-robot commented Jul 17, 2025

@jneczypor: This pull request references OSDOCS-14108 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.20.0" version, but no target version was set.

In response to this:

OSDOCS-14108: Review-Authentication & Authorization

Version(s):
4.19+

Issue:
https://issues.redhat.com/browse/OSDOCS-14108

Link to docs preview:

QE review:

  • QE has approved this change.

Additional information:

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci bot added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label Jul 17, 2025
@ocpdocs-previewbot
Copy link

ocpdocs-previewbot commented Jul 17, 2025

🤖 Thu Jul 24 23:57:35 - Prow CI generated the docs preview:
https://96304--ocpdocs-pr.netlify.app
Complete list of updated preview URLs: artifacts/updated_preview_urls.txt

@jneczypor
Copy link
Contributor Author

/retest

@openshift-ci-robot
Copy link

openshift-ci-robot commented Jul 23, 2025

@jneczypor: This pull request references OSDOCS-14108 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.20.0" version, but no target version was set.

In response to this:

OSDOCS-14108: Review-Authentication & Authorization

Version(s):
4.19+

Issue:
https://issues.redhat.com/browse/OSDOCS-14108

Link to docs preview:
Overview: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/
Understanding: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/understanding-authentication
Managing: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/managing-oauth-access-tokens
Configuring IDP: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/sd-configuring-identity-providers
Using RBAC: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/using-rbac
Understanding service accounts: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/understanding-and-creating-service-accounts
Using Service accounts: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/using-service-accounts-in-applications
Service account as OAuth: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/using-service-accounts-as-oauth-client
Assuming AWS IAM role: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/assuming-an-aws-iam-role-for-a-service-account
Scoping tokens: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/tokens-scoping
Using bound service tokens: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/bound-service-account-tokens
Managing security context: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/managing-security-context-constraints
Pod security: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/understanding-and-managing-pod-security-admission
Syncing LDAP groups: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/ldap-syncing

QE review:

  • QE has approved this change.

Additional information:

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link

openshift-ci-robot commented Jul 23, 2025

@jneczypor: This pull request references OSDOCS-14108 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.20.0" version, but no target version was set.

In response to this:

OSDOCS-14108: Review-Authentication & Authorization

Version(s):
4.19+

Issue:
https://issues.redhat.com/browse/OSDOCS-14108

Link to docs preview:
Overview: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/
Understanding: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/understanding-authentication
Managing: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/managing-oauth-access-tokens
Configuring IDP: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/sd-configuring-identity-providers
Using RBAC: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/using-rbac
Understanding service accounts: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/understanding-and-creating-service-accounts
Using Service accounts: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/using-service-accounts-in-applications
Service account as OAuth: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/using-service-accounts-as-oauth-client
Assuming AWS IAM role: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/assuming-an-aws-iam-role-for-a-service-account
Scoping tokens: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/tokens-scoping
Using bound service tokens: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/bound-service-account-tokens
Managing security context: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/managing-security-context-constraints
Pod security: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/understanding-and-managing-pod-security-admission
Syncing LDAP groups: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/ldap-syncing

QE review:
No QE needed.

Additional information:

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link

openshift-ci-robot commented Jul 23, 2025

@jneczypor: This pull request references OSDOCS-14108 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.20.0" version, but no target version was set.

In response to this:

OSDOCS-14108: Review-Authentication & Authorization
Name change NOT included. This can be picked up in the pruning tasks.

Version(s):
4.19+

Issue:
https://issues.redhat.com/browse/OSDOCS-14108

Link to docs preview:
Overview: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/
Understanding: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/understanding-authentication
Managing: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/managing-oauth-access-tokens
Configuring IDP: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/sd-configuring-identity-providers
Using RBAC: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/using-rbac
Understanding service accounts: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/understanding-and-creating-service-accounts
Using Service accounts: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/using-service-accounts-in-applications
Service account as OAuth: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/using-service-accounts-as-oauth-client
Assuming AWS IAM role: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/assuming-an-aws-iam-role-for-a-service-account
Scoping tokens: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/tokens-scoping
Using bound service tokens: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/bound-service-account-tokens
Managing security context: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/managing-security-context-constraints
Pod security: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/understanding-and-managing-pod-security-admission
Syncing LDAP groups: https://96304--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/authentication/ldap-syncing

QE review:
No QE needed.

Additional information:

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@fmcdonal
Copy link
Contributor

LGTM, minor changes and def statements all look good to me.

Copy link

openshift-ci bot commented Jul 24, 2025

@jneczypor: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@EricPonvelle
Copy link
Contributor

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jul 25, 2025
@EricPonvelle EricPonvelle merged commit 3bedab9 into openshift:main Jul 25, 2025
2 checks passed
@EricPonvelle
Copy link
Contributor

/cherrypick enterprise-4.19
/cherrypick enterprise-4.20

@openshift-cherrypick-robot

@EricPonvelle: new pull request created: #96706

In response to this:

/cherrypick enterprise-4.19
/cherrypick enterprise-4.20

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-cherrypick-robot

@EricPonvelle: new pull request created: #96707

In response to this:

/cherrypick enterprise-4.19
/cherrypick enterprise-4.20

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
branch/enterprise-4.19 branch/enterprise-4.20 jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants