-
Feature
-
Resolution: Unresolved
-
Critical
-
None
-
None
-
BU Product Work
-
False
-
-
False
-
OCPSTRAT-1691Supporting SPIFFE/SPIRE for Workload Identities in OpenShift
-
100% To Do, 0% In Progress, 0% Done
-
0
Feature Overview (aka. Goal Summary)
Workload identity is a key part of the zero-trust model. The SPIRE project aims to simplify the management and distribution of workload identities in the form of cryptographically verifiable identity documents. There is an increasing interest and uptake in this space within the Cloud native ecosystem. The goal is to give customers a practical and scalable way to establish trust in a multi-cloud, multi-platform environment. It will strengthen OpenShift’s security capabilities and value-add as organizations harden their security policies.
Goals (aka. expected user outcomes)
Day 2 Operator that can be deployed on OpenShift clusters by administrators to facilitate multi-cluster workload identity management with SPIFFE SVIDs for workloads
- SPIRE Server deployment, SPIRE controller Manager, OIDC Plugin,
- SPIRE agent deployments along with SPIFFE CSI Driver
Requirements (aka. Acceptance Criteria):
A list of specific needs or objectives that a feature must deliver in order to be considered complete. Be sure to include nonfunctional requirements such as security, reliability, performance, maintainability, scalability, usability, etc. Initial completion during Refinement status.
A new day-2 operator is required for installation, configuration and deployment topology of the spire components. |
Productization and release of operator using Konflux, issue support and maintenance of operator and operand. |
As part of OpenShift integration, using Spire as token issuer will require validation of token data and policies that must apply for generation of the tokens. |
Spire CSI driver facilitates x.509 certificate/JWT token injection for workloads. |
Anyone reviewing this Feature needs to know which deployment configurations that the Feature will apply to (or not) once it's been completed. Describe specific needs (or indicate N/A) for each of the following deployment scenarios. For specific configurations that are out-of-scope for a given release, ensure you provide the OCPSTRAT (for the future to be supported configuration) as well.
Deployment considerations | List applicable specific needs (N/A = not applicable) |
Self-managed, managed, or both | Self-managed |
Classic (standalone cluster) | Y |
Hosted control planes | Y |
Multi node, Compact (three node), or Single node (SNO), or all | |
Connected / Restricted Network | |
Architectures, e.g. x86_x64, ARM (aarch64), IBM Power (ppc64le), and IBM Z (s390x) | |
Operator compatibility | |
Backport needed (list applicable versions) | |
UI need (e.g. OpenShift Console, dynamic plugin, OCM) | |
Other (please specify) |
Use Cases (Optional):
Include use case diagrams, main success scenarios, alternative flow scenarios. Initial completion during Refinement status.
<To be added>
Questions to Answer (Optional):
Include a list of refinement / architectural questions that may need to be answered before coding can begin. Initial completion during Refinement status.
<your text here>
Out of Scope
High-level list of items that are out of scope. Initial completion during Refinement status.
<your text here>
Background
Provide any additional context is needed to frame the feature. Initial completion during Refinement status.
<your text here>
Customer Considerations
Provide any additional customer-specific considerations that must be made when designing and delivering the Feature. Initial completion during Refinement status.
<your text here>
Documentation Considerations
Provide information that needs to be considered and planned so that documentation will meet customer needs. If the feature extends existing functionality, provide a link to its current documentation. Initial completion during Refinement status.
<your text here>
Interoperability Considerations
Which other projects, including ROSA/OSD/ARO, and versions in our portfolio does this feature impact? What interoperability test scenarios should be factored by the layered products? Initial completion during Refinement status.
<your text here>
- is cloned by
-
OCPSTRAT-1763 SPIRE on Red Hat OpenShift [GA]
- New