This information is redundant as the install.md already provides information about installer prompting for the credentials. Also this causes confusion for users who rerun the described command and end up creating a new service principal that doesn't have the necessary permissions from Step 2.
4.2 KiB
Service Principal
Before proceeding with the OpenShift install, you should create a service principal with administrative rights for your subscription following the steps outlined here:
Azure: Creating an Service Principal
Step 1: Create a Service Principal
You can create a Service Principal using the Azure portal or the Azure cli
Step 2: Request permissions for the Service Principal from Tenant Administrator
In order to properly mint credentials for components in the cluster, your service principal needs to request for the following Application permissions before you can deploy OpenShift on Azure: Azure Active Directory Graph -> Application.ReadWrite.OwnedBy
You can request permissions using the Azure portal or the Azure cli.
Requesting permissions using the Azure cli
Find the AppId for your service principal by using,
$ az ad sp list --show-mine -otable
AccountEnabled AppDisplayName AppId AppOwnerTenantId AppRoleAssignmentRequired DisplayName Homepage ObjectId ObjectType Odata.type PublisherName ServicePrincipalType SignInAudience
---------------- ----------------- ------------------------------------ ------------------------------------ --------------------------- ----------------- ------------------------- ------------------------------------ ---------------- -------------------------------------------- --------------- ---------------------- ----------------
...
Use can request Application.ReadWrite.OwnedBy permission by using,
az ad app permission add --id <AppId> --api 00000002-0000-0000-c000-000000000000 --api-permissions 824c81eb-e3f8-4ee6-8f6d-de7f50d565b7=Role
NOTE: Application.ReadWrite.OwnedBy permission is granted to the the application only after it is provided an Admin Consent by the Tenant Administrator.
Step 3: Attach Administrative Role
Azure installer creates new identities for the cluster and therefore requires access to create new roles, and role assignments. Therefore, you will require the service principal to have at least Contributor and User Access Administrator roles assigned in your subscription.
You can create role assignments for your service principal using the Azure portal or the Azure cli
Step 4: Acquire Client Secret
You need to save the client secret values to configure your local machine to run the installer. This step is your opportunity to collect those values, and additional credentials can be added to the service principal in the Azure portal if you didn't capture them.
You can get client secret for your service principal using the Azure portal or the Azure cli