Red Hat Bugzilla – Bug 1356293
[RFE] Need Kerberised mount of volume into container
Last modified: 2018-06-20 04:20:54 EDT
Description of problem: We need a security model where volumes are secured per project, i.e. the PV claim happens and then the security and mounting is all controlled at the pod level not the container host. This way the container host cannot see any of the data in the volume in the pod. The requirement the customers in FSI industry have is that some data is very sensitive. Having a generic fuse mount to the container host (even if this is kerberised) is something that they will struggle to get signed off by their security teams. Some thoughts would be a sidecar model or keycloak style solution where the volume is encrypted to the pod and the project contains a secret to unlock this. Version-Release number of selected component (if applicable): 3.2+ How reproducible: Easily. Kerberos secured NFS cannot be mounted. Steps to Reproduce: 1. Setup Kerberised NFS export. 2. Create a PV from this 3. Try to mount PV into POD Actual results: Expected results: Additional info:
*** Bug 1332840 has been marked as a duplicate of this bug. ***