R: Re: Keycloack with Radosgw

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Pritha,

in step 4) I created a role with the Trust Policy:

radosgw-admin role create --role-name=S3Access2 --assume-role-policy-doc=\{\"Version\":\"2012-10-17\",\"Statement\":\[\{\"Effect\":\"Allow\",\"Principal\":\{\"Federated\":\"arn:aws:iam:::oidc-provider/ mykeycloak.org.com/auth/realms/myrealm\"\},\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":\{\"StringEquals\":\{\"mykeycloak.org.com/auth/realms/myrealm:clientId\":\"radosgw\"\}\}\}\]\}

Is this not correct?

To call the AssumeRoleWithWebIdentity I used curl:

curl -k -v -X GET "http://X.X.X.X:423/?Action=AssumeRoleWithWebIdentity&DurationSeconds=3600&RoleArn= arn:aws:iam:::role/S3Access &WebIdentityToken=XXXXXXXXXXX"


Best
Simone

-----Messaggio originale-----
Da: Pritha Srivastava <prsrivas@xxxxxxxxxx> 
Inviato: mercoledì 16 marzo 2022 11:11
A: simone.beccato@xxxxxxxxxxxxxx
Cc: ceph-users <ceph-users@xxxxxxx>
Oggetto:  Re: Keycloack with Radosgw

Hi Simone,

There is a step that I see missing here - have you created a role? For creating a role, you need to attach 'roles' caps to the user that you created.
Also, what tool have you used to make the AssumeRoleWithWebIdentity call?
An example using boto3 is outlined in the documentation here:
https://docs.ceph.com/en/pacific/radosgw/STS/#sts-configuration. Also in Pacific the trust policy supports only app_id in the Condition element:


[Index of Archives]     [Information on CEPH]     [Linux Filesystem Development]     [Ceph Development]     [Ceph Large]     [Ceph Dev]     [Linux USB Development]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [xfs]


  Powered by Linux