Uploaded image for project: 'OCMUI - OpenShift Cluster Manager UI'
  1. OCMUI - OpenShift Cluster Manager UI
  2. OCMUI-3985

Implement and expose in UI the new fips parameters, and when fips enabled the etcd encrypted parameter should be exposed too

XMLWordPrintable

    • Icon: Epic Epic
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • None
    • None
    • None
    • [OCMUI] ROSA HCP with FIPS target crypto
    • Product / Portfolio Work
    • False
    • False
    • In Progress
    • ROSA-123 - ROSA HCP with FIPS target crypto - hosted-cluster workers
    • 33% To Do, 0% In Progress, 67% Done
    • (02/17) waiting for readyness from backend to flip feature-gate in prod'

      Description

      As a cluster administrator, I want to create ROSA HCP clusters with FIPS cryptography enabled so that the cluster satisfies my security requirements

      Acceptance criteria

      When creating a ROSA HCP cluster it is possible to enable FIPS cryptography.

      When enabling FIPS encryption, auto-enable etcd encryption and prevent disabling it. By auto-enabling etcd encryption. a custom KMS key will become required (this is existing behavior and we are not changing it)

      The FIPS setting cannot be changed after a cluster is created.

      There are no specific tracking requirement as FIPS usage can be tracked with cluster creation.

              emalka@redhat.com Lyn M
              jcaiani@redhat.com Joseph Caiani
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

                Created:
                Updated: