Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Setup OIDC Authentication for MCP #222

Closed
sjoshi-jpl opened this issue Aug 18, 2023 · 11 comments
Closed

Setup OIDC Authentication for MCP #222

sjoshi-jpl opened this issue Aug 18, 2023 · 11 comments

Comments

@sjoshi-jpl
Copy link
Contributor

Work with MCP SA team to setup an IAM role for OIDC authentication. Similar to what we have in NGAP.

The role needs to be an AssumeRole that can be used for authenticating to MCP via GitHub Actions.

Based on the latest conversation with MCP SA team, we need to provide them with an IAM (least privilege) policy that will be attached to this role and grant our team access to deploy AWS resources. To do this, we need to come up with the list of services our PDS project uses in AWS and then define a set of permissions for each service.

@jordanpadams
Copy link
Member

jordanpadams commented Aug 18, 2023

@sjoshi-jpl when creating tickets, please try to use the issue templates like those specified here: https://github.com/NASA-PDS/registry/issues/new/choose. they add a whole bunch of default labels so these tickets show up in downstream reports correctly.

the issue templates don't work in the Zenhub interface, so they should not be used.

@jordanpadams
Copy link
Member

jordanpadams commented Aug 18, 2023

@nutjob4life next up after NASA-PDS/registry-sweepers#61

@nutjob4life
Copy link
Member

Hi @jordanpadams, I'm going to add @sjoshi-jpl to this as well since I don't have the NGAP, MCP, or role-provisioning experience in IAM. Conceptually I think I know how this'll work, but together we'll be able to make progress on it.

@tloubrieu-jpl
Copy link
Member

@sjoshi-jpl is updating the IAM role.

@sjoshi-jpl
Copy link
Contributor Author

Unable to create a new identity provider in MCP. Will need SA to create it for us.

@jordanpadams
Copy link
Member

Status: Awaiting SA support on this topic

@jordanpadams
Copy link
Member

Status: Ping from MCP they are working on it right now

@sjoshi-jpl
Copy link
Contributor Author

Setup complete for OIDC IdP and IAM role trust policy. However, still receiving error while using it. Working with MCP on a resolution.

@jordanpadams
Copy link
Member

MOA signed and emailed back

@sjoshi-jpl
Copy link
Contributor Author

OIDC setup fully tested and functional

@tloubrieu-jpl
Copy link
Member

I am closing this ticket.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants