Back to bug 1274084

Who When What Removed Added
Neil Levine 2015-10-21 21:06:29 UTC Target Release 1.3.2 2.0.0
CC mbenjamin, mwatts
Yehuda Sadeh 2016-01-26 19:49:31 UTC Status NEW ASSIGNED
Assignee yehuda mbenjamin
Ian Colle 2016-02-09 12:40:50 UTC CC icolle
Ken Dreyer (Red Hat) 2016-02-29 16:02:03 UTC Keywords FutureFeature
CC kdreyer
Red Hat Bugzilla 2016-02-29 16:02:03 UTC Doc Type Bug Fix Enhancement
Yuri Weinstein 2016-02-29 22:55:26 UTC CC yweinste
Flags needinfo?(mbenjamin)
Harish NV Rao 2016-03-09 10:40:48 UTC CC hnallurv
Ken Dreyer (Red Hat) 2016-03-15 01:24:49 UTC Target Release 2.0 2.1
Assignee mbenjamin mwatts
Flags needinfo?(mbenjamin)
Federico Lucifredi 2016-09-15 06:24:02 UTC Target Release 2.1 2.2
CC flucifre
Harish NV Rao 2017-01-09 09:23:42 UTC CC uboppana
Flags needinfo?(uboppana)
Uday Boppana 2017-01-09 14:39:12 UTC Flags needinfo?(uboppana) needinfo+
Uday Boppana 2017-01-09 14:42:28 UTC Flags needinfo?(kdreyer)
Ken Dreyer (Red Hat) 2017-01-09 17:05:29 UTC Flags needinfo?(kdreyer) needinfo?(mwatts)
Matt Benjamin (redhat) 2017-01-11 13:58:39 UTC Target Release 2.2 2.3
Flags needinfo?(mwatts)
Harish NV Rao 2017-03-30 19:49:27 UTC Flags needinfo?(mbenjamin)
Matt Benjamin (redhat) 2017-04-04 16:31:21 UTC Target Release 2.3 3.0
Flags needinfo?(mbenjamin)
Drew Harris 2017-07-06 14:17:54 UTC Target Release 3.0 4.0
CC anharris
Flags ceph-4.0?
RHEL Program Management 2017-07-06 14:22:19 UTC Flags ceph-4.0? ceph-4.0+
Drew Harris 2017-07-30 15:43:29 UTC Sub Component RGW
CC cbodley, kbader
Component Ceph RGW
PnT Account Manager 2018-02-08 14:21:51 UTC CC icolle
PnT Account Manager 2018-10-02 21:30:11 UTC CC owasserm
John Brier 2018-12-20 16:33:04 UTC CC jbrier
Red Hat Bugzilla Rules Engine 2018-12-20 18:04:12 UTC Target Release 4.0 2.* 2.* 3.*
Drew Harris 2019-01-08 16:41:04 UTC Target Release 3.* 4.0
Matt Benjamin (redhat) 2019-05-29 15:30:42 UTC CC prsrivas
Assignee mwatts prsrivas
Flags needinfo?(prsrivas)
Pritha Srivastava 2019-05-29 16:02:42 UTC Flags needinfo?(prsrivas)
Giridhar Ramaraju 2019-08-05 13:06:11 UTC QA Contact ceph-qe-bugs hgurav
Hemant G 2019-08-06 09:05:25 UTC QA Contact hgurav tchandra
Matt Benjamin (redhat) 2019-08-16 13:55:33 UTC Priority unspecified medium
Severity unspecified medium
Matt Benjamin (redhat) 2019-08-16 13:59:00 UTC Flags needinfo?(mwatts)
Tejas 2019-08-22 03:47:33 UTC Flags needinfo?(prsrivas)
Drew Harris 2019-11-25 17:28:37 UTC Target Release 4.0 4.1
Pritha Srivastava 2020-02-24 06:04:54 UTC Status ASSIGNED POST
Anjana Suparna Sriram 2020-03-11 14:25:31 UTC Blocks 1812537
errata-xmlrpc 2020-03-17 02:12:47 UTC Status POST MODIFIED
CC tserlin
Fixed In Version ceph-14.2.8-3.el8, ceph-14.2.8-3.el7
Status MODIFIED ON_QA
Karen Norteman 2020-03-31 19:22:39 UTC Flags needinfo?(prsrivas)
CC knortema
Blocks 1816167
Karen Norteman 2020-04-14 15:26:49 UTC Fixed In Version ceph-14.2.8-3.el8, ceph-14.2.8-3.el7 ceph-14.2.8-35.el8cp, ceph-14.2.8-28.el7cp
Flags needinfo?(prsrivas)
Pritha Srivastava 2020-04-15 13:40:21 UTC Doc Text Feature: Support for STS AssumeRoleWithWebIdentity, to allow users belonging to a web application that have been authenticated with an OpenID Connect/ OAuth 2.0 compliant IDP, to access s3 resources in rgw.

Reason: Allow external users to access s3 resources in rgw, obviating the need for those users to own permanent aws credentials.

Result:
Flags needinfo?(mwatts) needinfo?(prsrivas)
Karen Norteman 2020-04-24 16:01:56 UTC Fixed In Version ceph-14.2.8-35.el8cp, ceph-14.2.8-28.el7cp ceph-14.2.8-41.el8cp, ceph-14.2.8-33.el7cp
Docs Contact knortema
Doc Text Feature: Support for STS AssumeRoleWithWebIdentity, to allow users belonging to a web application that have been authenticated with an OpenID Connect/ OAuth 2.0 compliant IDP, to access s3 resources in rgw.

Reason: Allow external users to access s3 resources in rgw, obviating the need for those users to own permanent aws credentials.

Result:
.Support for Amazon S3 resources in RGW

AWS provides the Secure Token Service (STS)to allow secure federation with existing identity services such as Active Directory.
STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP).

Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through RGW.
With this update, RGW supports STS AssumeRoleWithWebIdentity.
This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through RGW.
Karen Norteman 2020-04-28 15:04:40 UTC Doc Text .Support for Amazon S3 resources in RGW

AWS provides the Secure Token Service (STS)to allow secure federation with existing identity services such as Active Directory.
STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP).

Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through RGW.
With this update, RGW supports STS AssumeRoleWithWebIdentity.
This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through RGW.
.Support for Amazon S3 resources in RGW

AWS provides the Secure Token Service (STS) to allow secure federation with existing identity services such as Active Directory.
STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP).

Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through RGW.
With this update, RGW supports STS AssumeRoleWithWebIdentity.
This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through RGW.
Karen Norteman 2020-04-30 14:01:48 UTC Doc Text .Support for Amazon S3 resources in RGW

AWS provides the Secure Token Service (STS) to allow secure federation with existing identity services such as Active Directory.
STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP).

Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through RGW.
With this update, RGW supports STS AssumeRoleWithWebIdentity.
This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through RGW.
.Support for Amazon S3 resources in RGW

AWS provides the Secure Token Service (STS) to allow secure federation with existing OpenID Connect/ OAuth2.0 compliant identity services such as Keycloak.
STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP).

Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through RGW.
With this update, RGW supports STS AssumeRoleWithWebIdentity.
This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through RGW.
Ranjini M N 2020-05-05 07:07:26 UTC CC rmandyam
Doc Text .Support for Amazon S3 resources in RGW

AWS provides the Secure Token Service (STS) to allow secure federation with existing OpenID Connect/ OAuth2.0 compliant identity services such as Keycloak.
STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP).

Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through RGW.
With this update, RGW supports STS AssumeRoleWithWebIdentity.
This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through RGW.
.Support for Amazon S3 resources in Ceph Object Gateway

AWS provides the Secure Token Service (STS) to allow secure federation with existing OpenID Connect/ OAuth2.0 compliant identity services such as Keycloak.
STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP).

Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through Ceph Object Gateway.
With this update, Ceph Object Gateway supports STS AssumeRoleWithWebIdentity.
This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through Ceph Object Gateway.
errata-xmlrpc 2020-05-19 15:11:06 UTC Status ON_QA RELEASE_PENDING
errata-xmlrpc 2020-05-19 17:30:39 UTC Status RELEASE_PENDING CLOSED
Resolution --- ERRATA
Last Closed 2020-05-19 17:30:39 UTC
errata-xmlrpc 2020-05-19 17:30:59 UTC Link ID Red Hat Product Errata RHSA-2020:2231
John Brier 2020-07-17 20:35:34 UTC Doc Text .Support for Amazon S3 resources in Ceph Object Gateway

AWS provides the Secure Token Service (STS) to allow secure federation with existing OpenID Connect/ OAuth2.0 compliant identity services such as Keycloak.
STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP).

Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through Ceph Object Gateway.
With this update, Ceph Object Gateway supports STS AssumeRoleWithWebIdentity.
This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through Ceph Object Gateway.
.Support for Amazon S3 resources in Ceph Object Gateway

AWS provides the Secure Token Service (STS) to allow secure federation with existing OpenID Connect/ OAuth2.0 compliant identity services such as Keycloak.
STS is a standalone REST service that provides temporary tokens for an application or user to access a Simple Storage Service (S3) endpoint after the user authenticates against an identity provider (IDP).

Previously, users without permanent Amazon Web Services (AWS) credentials could not access S3 resources through Ceph Object Gateway.
With this update, Ceph Object Gateway supports STS AssumeRoleWithWebIdentity.
This service allows web application users who have been authenticated with an OpenID Connect/OAuth 2.0 compliant IDP to access S3 resources through Ceph Object Gateway.

For more information, see link:{developer-guide}#secure-token-service_dev[Secure Token Service] in the link:{developer-guide}[Developer Guide].

Back to bug 1274084