Uploaded image for project: 'Red Hat OpenShift Control Planes'
  1. Red Hat OpenShift Control Planes
  2. CNTRLPLANE-1814

Add support for setting max expiration duration for KAS service account tokens

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Unresolved
    • Icon: Normal Normal
    • None
    • None
    • None
    • None
    • None
    • False
    • Hide

      None

      Show
      None
    • False
    • None
    • None
    • None
    • None

      As part of service-account-signing-key rotation, user might need to enforce a limited max expiration duration for the service account tokens to ensure a graceful period after which all service accounts tokens are signed with the new private key.

      The goal is to allow a graceful rotation and permit old tokens validation until the rotation is complete (i.e. all tokens rotated and signed with the new key)

       

      Requirements:

      • expose the ability on the HostedCluster API to specify max expiration duration for KAS service account tokens (via an annotation or API field)
      • set the '--service-account-max-token-expiration' flag on the kube-apiserver

              rh-ee-mraee Mulham Raee
              oadler@redhat.com Ori Haim Adler
              None
              None
              None
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: