diff --git a/authentication/managing_cloud_provider_credentials/cco-mode-sts.adoc b/authentication/managing_cloud_provider_credentials/cco-mode-sts.adoc index 9fd9f87d7e..9b572abc05 100644 --- a/authentication/managing_cloud_provider_credentials/cco-mode-sts.adoc +++ b/authentication/managing_cloud_provider_credentials/cco-mode-sts.adoc @@ -23,7 +23,7 @@ Requests for new and refreshed credentials are automated by using an appropriate //to-do: more detailed info on this flow .STS authentication flow -image::142_OpenShift_credentials_STS_0221.svg[Detailed authentication flow between AWS and the cluster when using AWS STS] +image::142_OpenShift_credentials_STS_0221.png[Detailed authentication flow between AWS and the cluster when using AWS STS] //to-do: improve alt-text Using manual mode with STS changes the content of the AWS credentials that are provided to individual {product-title} components. diff --git a/images/142_OpenShift_credentials_STS_0221.png b/images/142_OpenShift_credentials_STS_0221.png new file mode 100644 index 0000000000..c4f8be7b1b Binary files /dev/null and b/images/142_OpenShift_credentials_STS_0221.png differ diff --git a/images/142_OpenShift_credentials_STS_0221.svg b/images/142_OpenShift_credentials_STS_0221.svg deleted file mode 100644 index 0b90d3f8a4..0000000000 --- a/images/142_OpenShift_credentials_STS_0221.svg +++ /dev/null @@ -1 +0,0 @@ -142_OpenShift_0221PodOpenShiftAWSAWS servicesS3 bucketwith OIDC configurationIAM Role for podIAM Identity ProviderProjectedServiceAccount tokenAWS config fileToken signingTrusttokenssignedPublic keyPrivate keyServiceAccountsigning keys \ No newline at end of file