Skip to content

Commit e0edf72

Browse files
Merge pull request #95076 from snarayan-redhat/OSDOCS-14692_419
[enterprise-4.19] OSDOCS-14692: created the available features assembly
2 parents c1dc514 + cc11320 commit e0edf72

File tree

5 files changed

+62
-1
lines changed

5 files changed

+62
-1
lines changed

_topic_maps/_topic_map.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1266,6 +1266,8 @@ Topics:
12661266
File: zero-trust-manager-install
12671267
- Name: Uninstalling Zero Trust Workload Identity Manager
12681268
File: zero-trust-manager-uninstall
1269+
- Name: Zero Trust Workload Identity Manager features
1270+
File: zero-trust-manager-features
12691271
---
12701272
Name: Authentication and authorization
12711273
Dir: authentication
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * security/zero_trust_workload_identity_manager/zer-trust-manager-features.adoc
4+
5+
:_mod-docs-content-type: CONCEPT
6+
[id="zero-trust-manager-about-features_{context}"]
7+
= {zero-trust-full} components
8+
9+
The following components are available as part of the initial release of {zero-trust-full}.
10+
11+
[id="spiffe-csi-driver_{context}"]
12+
== SPIFFE CSI Driver
13+
14+
The SPIFFE Container Storage Interface (CSI) is a plugin that helps pods securely obtain their {svid-full} by delivering the Workload API socket into the pod. The SPIFFE CSI driver is deployed as a daemonset on the cluster ensuring that a driver instance runs on each node. The driver uses the ephemeral inline volume capability of Kubernetes allowing pods to request volumes directly provided by the SPIFFE CSI driver. This simplifies their use by applications that need temporary storage.
15+
16+
When the pod starts, the Kubelet calls the SPIFFE CSI driver to provision and mount a volume into the pod's containers. The SPIFFE CSI driver mounts a directory that contains the SPIFFE Workload API into the pod. Applications in the pod then communicate with the Workload API to obtain their SVIDs. The driver guarantees that each SVID is unique.
17+
18+
[id="spire-oidc-federation_{context}"]
19+
== SPIRE OpenID Connect Discovery Provider
20+
21+
The SPIRE OpenID Connect Discovery Provider is a standalone component that makes SPIRE-issued JWT-SVIDs compatible with standard OpenID Connect (OIDC) users by exposing a open ID configuration endpoint and a JWKS URI for token verification. It is essential for integrating SPIRE-based workload identity with systems that require OIDC-compliant tokens, especially, external APIs. While SPIRE primarily issues identities for workloads, additional workload-related claims can be embedded into JWT-SVIDs through the configuration of SPIRE, which these claims to be included in the token and verified by OIDC-compliant clients.
22+
23+
[id="spire-controller-manager_{context}"]
24+
== SPIRE Controller Manager
25+
26+
The SPIRE Controller Manager uses custom resource definitions (CRDs) to facilitate the registration of workloads. To facilitate workload registration, the SPIRE Controller Manager registers controllers against pods and CRDs. When changes are detected on these resources, a workload reconciliation process is triggered. This process determines which SPIRE entries should exist based on the existing pods and CRDs. The reconciliation process creates, updates, and deletes entries on the SPIRE server as appropriate.
27+
28+
The SPIRE Controller Manager is designed to be deployed on the same pod as the SPIRE server. The manager communicates with the SPIRE server API using a private UNIX Domain Socket within a shared volume.
29+
30+
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * security/zero_trust_workload_identity_manager/zer-trust-manager-features.adoc
4+
5+
:_mod-docs-content-type: CONCEPT
6+
[id="ztwim_features_{context}"]
7+
= {zero-trust-full} features
8+
9+
[id="spire-telemetry_{context}"]
10+
== SPIRE server and agent telemetry
11+
12+
SPIRE server and agent telemetry provide insight into the health of the SPIRE deployment. The metrics are in the format provided by the Prometheus Operator. The metrics exposed help in understanding server health & lifecycle, spire component performance, attestation and SVID issuance and plugin statistics.
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
[id="zero-trust-manager-features"]
3+
= Zero Trust Workload Identity Manager components and features
4+
5+
include::_attributes/common-attributes.adoc[]
6+
:context: zero-trust-manager-features
7+
8+
// SPIFFE SPIRE components
9+
include::modules/zero-trust-manager-about-components.adoc[leveloffset=+1]
10+
11+
//SPIRE features
12+
include::modules/zero-trust-manager-about-features.adoc[leveloffset=+1]
13+
14+
15+
16+
17+
18+

security/zero_trust_workload_identity_manager/zero-trust-manager-overview.adoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ include::_attributes/common-attributes.adoc[]
88
toc::[]
99

1010
:FeatureName: Zero Trust Workload Identity Manager
11-
1211
include::snippets/technology-preview.adoc[]
1312

1413
The {zero-trust-full} leverages {spiffe-full} and the SPIFFE Runtime Environment (SPIRE) to provide a comprehensive identity management solution for distributed systems. SPIFFE and SPIRE provide a standardized approach to workload identity, allowing workloads to communicate with other services whether on the same cluster, or in another environment.

0 commit comments

Comments
 (0)