Back to bug 1274084
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Neil Levine | 2015-10-21 21:06:29 UTC | Target Release | 1.3.2 | 2.0.0 |
| CC | mbenjamin, mwatts | |||
| Yehuda Sadeh | 2016-01-26 19:49:31 UTC | Status | NEW | ASSIGNED |
| Assignee | yehuda | mbenjamin | ||
| Ian Colle | 2016-02-09 12:40:50 UTC | CC | icolle | |
| Ken Dreyer (Red Hat) | 2016-02-29 16:02:03 UTC | Keywords | FutureFeature | |
| CC | kdreyer | |||
| Red Hat Bugzilla | 2016-02-29 16:02:03 UTC | Doc Type | Bug Fix | Enhancement |
| Yuri Weinstein | 2016-02-29 22:55:26 UTC | CC | yweinste | |
| Flags | needinfo?(mbenjamin) | |||
| Harish NV Rao | 2016-03-09 10:40:48 UTC | CC | hnallurv | |
| Ken Dreyer (Red Hat) | 2016-03-15 01:24:49 UTC | Target Release | 2.0 | 2.1 |
| Assignee | mbenjamin | mwatts | ||
| Flags | needinfo?(mbenjamin) | |||
| Federico Lucifredi | 2016-09-15 06:24:02 UTC | Target Release | 2.1 | 2.2 |
| CC | flucifre | |||
| Harish NV Rao | 2017-01-09 09:23:42 UTC | CC | uboppana | |
| Flags | needinfo?(uboppana) | |||
| Uday Boppana | 2017-01-09 14:39:12 UTC | Flags | needinfo?(uboppana) | needinfo+ |
| Uday Boppana | 2017-01-09 14:42:28 UTC | Flags | needinfo?(kdreyer) | |
| Ken Dreyer (Red Hat) | 2017-01-09 17:05:29 UTC | Flags | needinfo?(kdreyer) | needinfo?(mwatts) |
| Matt Benjamin (redhat) | 2017-01-11 13:58:39 UTC | Target Release | 2.2 | 2.3 |
| Flags | needinfo?(mwatts) | |||
| Harish NV Rao | 2017-03-30 19:49:27 UTC | Flags | needinfo?(mbenjamin) | |
| Matt Benjamin (redhat) | 2017-04-04 16:31:21 UTC | Target Release | 2.3 | 3.0 |
| Flags | needinfo?(mbenjamin) | |||
| Drew Harris | 2017-07-06 14:17:54 UTC | Target Release | 3.0 | 4.0 |
| CC | anharris | |||
| Flags | ceph-4.0? | |||
| RHEL Program Management | 2017-07-06 14:22:19 UTC | Flags | ceph-4.0? | ceph-4.0+ |
| Drew Harris | 2017-07-30 15:43:29 UTC | Sub Component | RGW | |
| CC | cbodley, kbader | |||
| Component | Ceph | RGW | ||
| PnT Account Manager | 2018-02-08 14:21:51 UTC | CC | icolle | |
| PnT Account Manager | 2018-10-02 21:30:11 UTC | CC | owasserm | |
| John Brier | 2018-12-20 16:33:04 UTC | CC | jbrier | |
| Red Hat Bugzilla Rules Engine | 2018-12-20 18:04:12 UTC | Target Release | 4.0 2.* | 2.* 3.* |
| Drew Harris | 2019-01-08 16:41:04 UTC | Target Release | 3.* | 4.0 |
| Matt Benjamin (redhat) | 2019-05-29 15:30:42 UTC | CC | prsrivas | |
| Assignee | mwatts | prsrivas | ||
| Flags | needinfo?(prsrivas) | |||
| Pritha Srivastava | 2019-05-29 16:02:42 UTC | Flags | needinfo?(prsrivas) | |
| Giridhar Ramaraju | 2019-08-05 13:06:11 UTC | QA Contact | ceph-qe-bugs | hgurav |
| Hemant G | 2019-08-06 09:05:25 UTC | QA Contact | hgurav | tchandra |
| Matt Benjamin (redhat) | 2019-08-16 13:55:33 UTC | Priority | unspecified | medium |
| Severity | unspecified | medium | ||
| Matt Benjamin (redhat) | 2019-08-16 13:59:00 UTC | Flags | needinfo?(mwatts) | |
| Tejas | 2019-08-22 03:47:33 UTC | Flags | needinfo?(prsrivas) | |
| Drew Harris | 2019-11-25 17:28:37 UTC | Target Release | 4.0 | 4.1 |
| Pritha Srivastava | 2020-02-24 06:04:54 UTC | Status | ASSIGNED | POST |
| Anjana Suparna Sriram | 2020-03-11 14:25:31 UTC | Blocks | 1812537 | |
| errata-xmlrpc | 2020-03-17 02:12:47 UTC | Status | POST | MODIFIED |
| CC | tserlin | |||
| Fixed In Version | ceph-14.2.8-3.el8, ceph-14.2.8-3.el7 | |||
| Status | MODIFIED | ON_QA | ||
| Karen Norteman | 2020-03-31 19:22:39 UTC | Flags | needinfo?(prsrivas) | |
| CC | knortema | |||
| Blocks | 1816167 | |||
| Karen Norteman | 2020-04-14 15:26:49 UTC | Fixed In Version | ceph-14.2.8-3.el8, ceph-14.2.8-3.el7 | ceph-14.2.8-35.el8cp, ceph-14.2.8-28.el7cp |
| Flags | needinfo?(prsrivas) | |||
| Pritha Srivastava | 2020-04-15 13:40:21 UTC | Doc Text | Feature: Support for STS AssumeRoleWithWebIdentity, to allow users belonging to a web application that have been authenticated with an OpenID Connect/ OAuth 2.0 compliant IDP, to access s3 resources in rgw. Reason: Allow external users to access s3 resources in rgw, obviating the need for those users to own permanent aws credentials. Result: | |
| Flags | needinfo?(mwatts) needinfo?(prsrivas) | |||
| Karen Norteman | 2020-04-24 16:01:56 UTC | Fixed In Version | ceph-14.2.8-35.el8cp, ceph-14.2.8-28.el7cp | ceph-14.2.8-41.el8cp, ceph-14.2.8-33.el7cp |
| Docs Contact | knortema | |||
| Doc Text | Feature: Support for STS AssumeRoleWithWebIdentity, to allow users belonging to a web application that have been authenticated with an OpenID Connect/ OAuth 2.0 compliant IDP, to access s3 resources in rgw. Reason: Allow external users to access s3 resources in rgw, obviating the need for those users to own permanent aws credentials. Result: | .Support for Amazon S3 resources in RGW AWS provides the Secure Token Service (STS)to allow secure federation with existing identity services such as Active Directory. STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP). Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through RGW. With this update, RGW supports STS AssumeRoleWithWebIdentity. This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through RGW. |
||
| Karen Norteman | 2020-04-28 15:04:40 UTC | Doc Text | .Support for Amazon S3 resources in RGW AWS provides the Secure Token Service (STS)to allow secure federation with existing identity services such as Active Directory. STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP). Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through RGW. With this update, RGW supports STS AssumeRoleWithWebIdentity. This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through RGW. | .Support for Amazon S3 resources in RGW AWS provides the Secure Token Service (STS) to allow secure federation with existing identity services such as Active Directory. STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP). Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through RGW. With this update, RGW supports STS AssumeRoleWithWebIdentity. This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through RGW. |
| Karen Norteman | 2020-04-30 14:01:48 UTC | Doc Text | .Support for Amazon S3 resources in RGW AWS provides the Secure Token Service (STS) to allow secure federation with existing identity services such as Active Directory. STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP). Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through RGW. With this update, RGW supports STS AssumeRoleWithWebIdentity. This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through RGW. | .Support for Amazon S3 resources in RGW AWS provides the Secure Token Service (STS) to allow secure federation with existing OpenID Connect/ OAuth2.0 compliant identity services such as Keycloak. STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP). Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through RGW. With this update, RGW supports STS AssumeRoleWithWebIdentity. This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through RGW. |
| Ranjini M N | 2020-05-05 07:07:26 UTC | CC | rmandyam | |
| Doc Text | .Support for Amazon S3 resources in RGW AWS provides the Secure Token Service (STS) to allow secure federation with existing OpenID Connect/ OAuth2.0 compliant identity services such as Keycloak. STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP). Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through RGW. With this update, RGW supports STS AssumeRoleWithWebIdentity. This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through RGW. | .Support for Amazon S3 resources in Ceph Object Gateway AWS provides the Secure Token Service (STS) to allow secure federation with existing OpenID Connect/ OAuth2.0 compliant identity services such as Keycloak. STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP). Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through Ceph Object Gateway. With this update, Ceph Object Gateway supports STS AssumeRoleWithWebIdentity. This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through Ceph Object Gateway. |
||
| errata-xmlrpc | 2020-05-19 15:11:06 UTC | Status | ON_QA | RELEASE_PENDING |
| errata-xmlrpc | 2020-05-19 17:30:39 UTC | Status | RELEASE_PENDING | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2020-05-19 17:30:39 UTC | |||
| errata-xmlrpc | 2020-05-19 17:30:59 UTC | Link ID | Red Hat Product Errata RHSA-2020:2231 | |
| John Brier | 2020-07-17 20:35:34 UTC | Doc Text | .Support for Amazon S3 resources in Ceph Object Gateway AWS provides the Secure Token Service (STS) to allow secure federation with existing OpenID Connect/ OAuth2.0 compliant identity services such as Keycloak. STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP). Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through Ceph Object Gateway. With this update, Ceph Object Gateway supports STS AssumeRoleWithWebIdentity. This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through Ceph Object Gateway. | .Support for Amazon S3 resources in Ceph Object Gateway AWS provides the Secure Token Service (STS) to allow secure federation with existing OpenID Connect/ OAuth2.0 compliant identity services such as Keycloak. STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP). Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through Ceph Object Gateway. With this update, Ceph Object Gateway supports STS AssumeRoleWithWebIdentity. This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through Ceph Object Gateway. For more information, see link:{developer-guide}#secure-token-service_dev[Secure Token Service] in the link:{developer-guide}[Developer Guide]. |
Back to bug 1274084