Uploaded image for project: 'OCMUI - OpenShift Cluster Manager UI'
  1. OCMUI - OpenShift Cluster Manager UI
  2. OCMUI-3985

Implement and expose in UI the new fips parameters, and when fips enabled the etcd encrypted parameter should be exposed too

XMLWordPrintable

    • Icon: Epic Epic
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • None
    • None
    • None
    • [OCMUI] ROSA HCP with FIPS target crypto
    • Product / Portfolio Work
    • False
    • Hide

      None

      Show
      None
    • False
    • To Do
    • ROSA-123 - ROSA HCP with FIPS target crypto
    • 100% To Do, 0% In Progress, 0% Done

      Description

      As a cluster administrator, I want to create ROSA HCP clusters with FIPS cryptography enabled so that the cluster satisfies my security requirements

      Acceptance criteria

      When creating a ROSA HCP cluster it is possible to enable FIPS cryptography.

      When enabling FIPS encryption, auto-enable etcd encryption and prevent disabling it. By auto-enabling etcd encryption. a custom KMS key will become required (this is existing behavior and we are not changing it)

      The FIPS setting cannot be changed after a cluster is created.

      There are no specific tracking requirement as FIPS usage can be tracked with cluster creation.

              Unassigned Unassigned
              jcaiani@redhat.com Joseph Caiani
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: