Granting Workloads Access to OCI Resources
Find out how to use the identity of a workload running on a Kubernetes cluster to grant the workload fine-grained access to other OCI resources using Kubernetes Engine (OKE).
You can only use workload identities to grant access to OCI resources when using enhanced clusters. See Enhanced Clusters.
In Kubernetes, a workload is an application running on a Kubernetes cluster. A workload can be one application component running inside a single pod, or several application components running inside a set of pods that work together. All the pods in the workload run in the same namespace.
To grant all the pods in a workload access to Kubernetes resources, you can specify that every pod in the workload is to use the same Kubernetes service account. You can then grant Kubernetes cluster role permissions to the service account. It is the service account that binds the pods in the workload to cluster role permissions, and grants the pods access to Kubernetes resources.
In Oracle Cloud Infrastructure, a workload running on a Kubernetes cluster is considered a resource in its own right. A workload resource is identified by the unique combination of cluster, namespace, and service account. This unique combination is referred to as the workload identity. You can use the workload identity when defining IAM policies to grant fine-grained access to other OCI resources (such as Object Storage buckets). In addition, you can use Oracle Cloud Infrastructure Audit to satisfy compliance requirements by tracking requests made by the workload identity, enabling you to monitor and report unauthorized access and suspicious activity.
To grant all the pods in a workload access to OCI resources:
- Create a namespace for a service account.
- Create a service account for the application to use.
- Define an IAM policy to grant the workload resource access to other OCI resources.
- Download and configure the appropriate OCI SDK for the language in which the application is written.
- Edit the application to specify:
-
- that workload requests are to be authenticated using the Kubernetes Engine workload identity provider
- the OCI resources that are to be accessed
- Update the application's deployment spec to specify that every pod in the workload is to use the service account.
Note the following when using workload identities:
- You cannot currently use workload identities with dynamic groups.
- You can only use workload identities with an OCI SDK, not with the Console or the API.
- The following OCI SDKs currently support workload identities:
- Go SDK v65.32.0 (and later)
- Java SDK v2.54.0 (and later)
- Python SDK v2.111.0 (and later)
- .NET SDK v87.3.0 (and later)
- Ruby SDK v2.19.0 (and later)
Example: Using the Go SDK to Grant Application Workloads Access to OCI Resources
To grant Go application workloads running on a Kubernetes cluster access to other OCI resources:
-
If you haven't already done so, follow the steps to set up the cluster's kubeconfig configuration file and (if necessary) set the KUBECONFIG environment variable to point to the file. Note that you must set up your own kubeconfig file. You cannot access a cluster using a kubeconfig file that a different user set up. See Setting Up Cluster Access.
- Obtain the OCID of the cluster (for example, using the Cluster Details tab in the Console).
-
Create a namespace for the Kubernetes service account to use by entering:
kubectl create namespace <namespace-name>
For example:
kubectl create namespace finance
- Create a Kubernetes service account for the application to use by entering:
kubectl create serviceaccount <service-account-name> --namespace <namespace-name>
For example:
kubectl create serviceaccount financeserviceaccount --namespace finance
- Define an IAM policy to enable the workload to access the necessary OCI resources:
- Open the navigation menu and click Identity & Security. Under Identity, click Policies.
- Follow the instructions in To create a policy, and give the policy a name (for example,
acme-oke-finance-workload-policy
). -
Enter a policy statement to enable the workload to access the necessary OCI resources, in the format:
Allow any-user to <verb> <resource> in <location> where all { request.principal.type = 'workload', request.principal.namespace = '<namespace-name>', request.principal.service_account = '<service-account-name>', request.principal.cluster_id = '<cluster-ocid>'}
where:
<namespace-name>
is the name of the namespace that you created previously.<service-account-name>
is the name of the service account that you created previously.<cluster-ocid>
is the cluster's OCID that you obtained previously.
For example:
Allow any-user to manage objects in tenancy where all { request.principal.type = 'workload', request.principal.namespace = 'finance', request.principal.service_account = 'financeserviceaccount', request.principal.cluster_id = 'ocid1.cluster.oc1.iad.aaaaaaaaaf______jrd'}
- Click Create to create the new policy.
- Install the OCI SDK for Go (see SDK for Go).
-
In your Go application code, add:
- the Kubernetes Engine workload identity provider (
OkeWorkloadIdentityConfigurationProvider
) - the OCI resource to access
For example, the following code snippet uses the workload identity for authentication, creates a bucket in the Object Storage service in the Pheonix (PHX) region, and uploads a file to the bucket:
// ExampleObjectStorage_UploadFile shows how to create a bucket and upload a file using OKE Workload Identity func ExampleObjectStorage_UploadFile() { rp, err := auth.OkeWorkloadIdentityConfigurationProvider() if err != nil { panic(err) } c, clerr := objectstorage.NewObjectStorageClientWithConfigurationProvider(rp) c.SetRegion("us-phoenix-1") helpers.FatalIfError(clerr) ctx := context.Background() bname := helpers.GetRandomString(8) namespace := getNamespace(ctx, c) createBucket(ctx, c, namespace, bname) contentlen := 1024 * 1000 filepath, filesize := helpers.WriteTempFileOfSize(int64(contentlen)) filename := path.Base(filepath) defer func() { os.Remove(filename) }() file, e := os.Open(filepath) defer file.Close() helpers.FatalIfError(e) e = putObject(ctx, c, namespace, bname, filename, filesize, file, nil) helpers.FatalIfError(e) // Output: // get namespace // create bucket // put object
- the Kubernetes Engine workload identity provider (
- Open the application's deployment spec in a text editor and:
- Add
serviceAccountName
and set it to the name of the service account you created earlier. For example,serviceAccountName: financeserviceaccount
. - Add
automountServiceAccountToken
and set it totrue
.
For example:
apiVersion: v1 kind: Pod metadata: name: nginx spec: serviceAccountName: financeserviceaccount automountServiceAccountToken: true containers: - name: nginx image: nginx:1.14.2 ports: - containerPort: 80
- Add
- Deploy the application by entering:
kubectl create -f <filename>
For example:kubectl create -f financeworkloadidentity.yaml
Example: Using the Java SDK to Grant Application Workloads Access to OCI Resources
To grant Java application workloads running on a Kubernetes cluster access to other OCI resources:
-
If you haven't already done so, follow the steps to set up the cluster's kubeconfig configuration file and (if necessary) set the KUBECONFIG environment variable to point to the file. Note that you must set up your own kubeconfig file. You cannot access a cluster using a kubeconfig file that a different user set up. See Setting Up Cluster Access.
- Obtain the OCID of the cluster (for example, using the Cluster Details tab in the Console).
-
Create a namespace for the Kubernetes service account to use by entering:
kubectl create namespace <namespace-name>
For example:
kubectl create namespace finance
- Create a Kubernetes service account for the application to use by entering:
kubectl create serviceaccount <service-account-name> --namespace <namespace-name>
For example:
kubectl create serviceaccount financeserviceaccount --namespace finance
- Define an IAM policy to enable the workload to access the necessary OCI resources:
- Open the navigation menu and click Identity & Security. Under Identity, click Policies.
- Follow the instructions in To create a policy, and give the policy a name (for example,
acme-oke-finance-workload-policy
). -
Enter a policy statement to enable the workload to access the necessary OCI resources, in the format:
Allow any-user to <verb> <resource> in <location> where all { request.principal.type = 'workload', request.principal.namespace = '<namespace-name>', request.principal.service_account = '<service-account-name>', request.principal.cluster_id = '<cluster-ocid>'}
where:
<namespace-name>
is the name of the namespace that you created previously.<service-account-name>
is the name of the service account that you created previously.<cluster-ocid>
is the cluster's OCID that you obtained previously.
For example:
Allow any-user to manage objects in tenancy where all { request.principal.type = 'workload', request.principal.namespace = 'finance', request.principal.service_account = 'financeserviceaccount', request.principal.cluster_id = 'ocid1.cluster.oc1.iad.aaaaaaaaaf______jrd'}
- Click Create to create the new policy.
- Install the OCI SDK for Java (see SDK for Java).
- In the application's pom.xml, add the
oci-java-sdk-addons-oke-workload-identity
artifact as a dependency:
Note the SDK version must be 2.54.0 or later.<dependency> <groupId>com.oracle.oci.sdk</groupId> <artifactId>oci-java-sdk-addons-oke-workload-identity</artifactId> <version>2.54.0</version> </dependency> <dependency> <groupId>com.oracle.oci.sdk</groupId> <artifactId>oci-java-sdk-common</artifactId> <version>2.54.0</version> </dependency>
- In your Java application code, add:
- the Kubernetes Engine workload identity provider (
OkeWorkloadIdentityAuthenticationDetailsProvider
) - the OCI resource to access
For example, the following code snippet uses the workload identity for authentication, creates a bucket in the Object Storage service in the Pheonix (PHX) region, and uploads a file to the bucket:
import com.oracle.bmc.Region; import com.oracle.bmc.auth.AuthenticationDetailsProvider; import com.oracle.bmc.auth.ConfigFileAuthenticationDetailsProvider; import com.oracle.bmc.auth.okeworkloadidentity.OkeWorkloadIdentityAuthenticationDetailsProvider; import com.oracle.bmc.objectstorage.ObjectStorage; import com.oracle.bmc.objectstorage.ObjectStorageClient; import com.oracle.bmc.objectstorage.model.BucketSummary; import com.oracle.bmc.objectstorage.requests.GetNamespaceRequest; import com.oracle.bmc.objectstorage.requests.GetObjectRequest; import com.oracle.bmc.objectstorage.requests.ListBucketsRequest; import com.oracle.bmc.objectstorage.requests.ListBucketsRequest.Builder; import com.oracle.bmc.objectstorage.responses.GetNamespaceResponse; import com.oracle.bmc.objectstorage.responses.GetObjectResponse; import com.oracle.bmc.objectstorage.responses.ListBucketsResponse; import java.io.InputStream; public class ObjectStorageSyncExample { public static void main(String[] args) throws Exception { /* Config the Container Engine for Kubernetes workload identity provider */ final OkeWorkloadIdentityAuthenticationDetailsProvider provider = new OkeWorkloadIdentityAuthenticationDetailsProvider .OkeWorkloadIdentityAuthenticationDetailsProviderBuilder() .build(); /* Configure the client to use workload identity provider*/ ObjectStorage client = ObjectStorageClient.builder().region(Region.US_PHOENIX_1).build(provider); GetNamespaceResponse namespaceResponse = client.getNamespace(GetNamespaceRequest.builder().build()); String namespaceName = namespaceResponse.getValue(); System.out.println("Using namespace: " + namespaceName); Builder listBucketsBuilder = ListBucketsRequest.builder() .namespaceName(namespaceName) .compartmentId("enter tenancy id"); String nextToken = null; do { listBucketsBuilder.page(nextToken); ListBucketsResponse listBucketsResponse = client.listBuckets(listBucketsBuilder.build()); for (BucketSummary bucket : listBucketsResponse.getItems()) { System.out.println("Found bucket: " + bucket.getName()); } nextToken = listBucketsResponse.getOpcNextPage(); } while (nextToken != null); // fetch the file from the object storage String bucketName = null; String objectName = null; GetObjectResponse getResponse = client.getObject( GetObjectRequest.builder() .namespaceName(namespaceName) .bucketName(bucketName) .objectName(objectName) .build()); // stream contents should match the file uploaded try (final InputStream fileStream = getResponse.getInputStream()) { // use fileStream } // try-with-resources automatically closes fileStream client.close(); } }
- the Kubernetes Engine workload identity provider (
- Open the application's deployment spec in a text editor and:
- Add
serviceAccountName
and set it to the name of the service account you created earlier. For example,serviceAccountName: financeserviceaccount
. - Add
automountServiceAccountToken
and set it totrue
.
For example:
apiVersion: v1 kind: Pod metadata: name: nginx spec: serviceAccountName: financeserviceaccount automountServiceAccountToken: true containers: - name: nginx image: nginx:1.14.2 ports: - containerPort: 80
- Add
- Deploy the application by entering:
kubectl create -f <filename>
For example:kubectl create -f financeworkloadidentity.yaml
Example: Using the Java SDK to Grant Application Workloads Access to OCI Resources in a Different Compartment
To grant Java application workloads running on a Kubernetes cluster in one compartment access to other OCI resources in a different compartment:
-
If you haven't already done so, follow the steps to set up the cluster's kubeconfig configuration file and (if necessary) set the KUBECONFIG environment variable to point to the file. Note that you must set up your own kubeconfig file. You cannot access a cluster using a kubeconfig file that a different user set up. See Setting Up Cluster Access.
- Obtain the OCID of the cluster (for example, using the Cluster Details tab in the Console).
- As the cluster administrator, create a namespace for the Kubernetes service account to use by entering:
kubectl create namespace <namespace-name>
For example:
kubectl create namespace finance
-
As the cluster administrator, create a Kubernetes service account for the application to use by entering:
kubectl create serviceaccount <service-account-name> --namespace <namespace-name>
For example:
kubectl create serviceaccount financeserviceaccount --namespace finance
-
As the tenancy administrator, define an IAM policy to allow a cluster administrator to bind workloads running on a cluster in one compartment, to other OCI resources in a different compartment:
- Open the navigation menu and click Identity & Security. Under Identity, click Policies.
- Follow the instructions in To create a policy, and give the policy a name (for example,
acme-oke-finance-workload-policy
). Enter policy statements to allow a cluster administrator to bind workloads running on a cluster in one compartment, to other OCI resources in a different compartment, in the format:
Allow group cluster-admins to manage cluster-workload-mappings in compartment <compartment-one> Allow group cluster-admins to {CLUSTER_WORKLOAD_COMPARTMENT_BIND,CLUSTER_WORKLOAD_COMPARTMENT_UNBIND} in compartment <compartment-two>
where:
<compartment-one>
is the compartment to which the cluster belongs<compartment-two>
is the compartment to which the other OCI resources belong
For example:
Note that if a group is not in the default identity domain, prefix the group name with the identity domain name, in the formatAllow group cluster-admins to manage cluster-workload-mappings in compartment finance Allow group cluster-admins to {CLUSTER_WORKLOAD_COMPARTMENT_BIND,CLUSTER_WORKLOAD_COMPARTMENT_UNBIND} in compartment sales
group '<identity-domain-name>'/'group-name'
. You can also specify a group using its OCID, in the formatgroup id <group-ocid>
.- Click Create to create the new policy.
-
As the cluster administrator, in the compartment to which the cluster belongs, create a workload mapping that maps workloads running on the cluster to the compartment that the other OCI resources belong to:
oci ce workload-mapping create --namespace <namespace-name> --mapped-compartment-id <compartment-two-ocid> --cluster-id <cluster-ocid>
For example:
oci ce workload-mapping create --namespace finance --mapped-compartment-id ocid1.compartment.oc1..aaaaaaaaad______fda --cluster-id ocid1.cluster.oc1.iad.aaaaaaaaaf______jrd
-
As the administrator of the resource in the second compartment, define an IAM policy to enable the workload to access the OCI resources in the compartment:
- Open the navigation menu and click Identity & Security. Under Identity, click Policies.
- Follow the instructions in To create a policy, and give the policy a name (for example,
acme-oke-finance-workload-policy
). -
Enter a policy statement to enable the workload to access the necessary OCI resources, in the format:
Allow any-user to <verb> <resource> in <location> where all { request.principal.type = 'workload', request.principal.namespace = '<namespace-name>', request.principal.service_account = '<service-account-name>', request.principal.cluster_id = '<cluster-ocid>'}
where:
<namespace-name>
is the name of the namespace that you created previously.<service-account-name>
is the name of the service account that you created previously.<cluster-ocid>
is the cluster's OCID that you obtained previously.
For example:
Allow any-user to manage objects in compartment sales where all { request.principal.type = 'workload', request.principal.namespace = 'finance', request.principal.service_account = 'financeserviceaccount', request.principal.cluster_id = 'ocid1.cluster.oc1.iad.aaaaaaaaaf______jrd'}
- Click Create to create the new policy.
- Install the OCI SDK for Java (see SDK for Java). Note the SDK version must be 2.66.0 or later (or 3.18.0 or later).
- In the application's pom.xml, add the
oci-java-sdk-addons-oke-workload-identity
artifact as a dependency:
Note the SDK version must be 2.66.0 or later (or 3.18.0 or later).<dependency> <groupId>com.oracle.oci.sdk</groupId> <artifactId>oci-java-sdk-addons-oke-workload-identity</artifactId> <version>2.66.0</version> </dependency> <dependency> <groupId>com.oracle.oci.sdk</groupId> <artifactId>oci-java-sdk-common</artifactId> <version>2.66.0</version> </dependency>
- In your Java application code, add:
- the Kubernetes Engine workload identity provider (
OkeWorkloadIdentityAuthenticationDetailsProvider
) - the OCI resource to access
For example, the following code snippet uses the workload identity for authentication, creates a bucket in the Object Storage service in the Pheonix (PHX) region, and uploads a file to the bucket:
import com.oracle.bmc.Region; import com.oracle.bmc.auth.AuthenticationDetailsProvider; import com.oracle.bmc.auth.ConfigFileAuthenticationDetailsProvider; import com.oracle.bmc.auth.okeworkloadidentity.OkeWorkloadIdentityAuthenticationDetailsProvider; import com.oracle.bmc.objectstorage.ObjectStorage; import com.oracle.bmc.objectstorage.ObjectStorageClient; import com.oracle.bmc.objectstorage.model.BucketSummary; import com.oracle.bmc.objectstorage.requests.GetNamespaceRequest; import com.oracle.bmc.objectstorage.requests.GetObjectRequest; import com.oracle.bmc.objectstorage.requests.ListBucketsRequest; import com.oracle.bmc.objectstorage.requests.ListBucketsRequest.Builder; import com.oracle.bmc.objectstorage.responses.GetNamespaceResponse; import com.oracle.bmc.objectstorage.responses.GetObjectResponse; import com.oracle.bmc.objectstorage.responses.ListBucketsResponse; import java.io.InputStream; public class ObjectStorageSyncExample { public static void main(String[] args) throws Exception { /* Config the Container Engine for Kubernetes workload identity provider */ final OkeWorkloadIdentityAuthenticationDetailsProvider provider = new OkeWorkloadIdentityAuthenticationDetailsProvider .OkeWorkloadIdentityAuthenticationDetailsProviderBuilder() .build(); /* Configure the client to use workload identity provider*/ ObjectStorage client = ObjectStorageClient.builder().region(Region.US_PHOENIX_1).build(provider); GetNamespaceResponse namespaceResponse = client.getNamespace(GetNamespaceRequest.builder().build()); String namespaceName = namespaceResponse.getValue(); System.out.println("Using namespace: " + namespaceName); Builder listBucketsBuilder = ListBucketsRequest.builder() .namespaceName(namespaceName) .compartmentId("enter tenancy id"); String nextToken = null; do { listBucketsBuilder.page(nextToken); ListBucketsResponse listBucketsResponse = client.listBuckets(listBucketsBuilder.build()); for (BucketSummary bucket : listBucketsResponse.getItems()) { System.out.println("Found bucket: " + bucket.getName()); } nextToken = listBucketsResponse.getOpcNextPage(); } while (nextToken != null); // fetch the file from the object storage String bucketName = null; String objectName = null; GetObjectResponse getResponse = client.getObject( GetObjectRequest.builder() .namespaceName(namespaceName) .bucketName(bucketName) .objectName(objectName) .build()); // stream contents should match the file uploaded try (final InputStream fileStream = getResponse.getInputStream()) { // use fileStream } // try-with-resources automatically closes fileStream client.close(); } }
- the Kubernetes Engine workload identity provider (
- Open the application's deployment spec in a text editor and:
- Add
namespace
and set it to the name of the namespace you created earlier. For example,namespace: finance
. - Add
serviceAccountName
and set it to the name of the service account you created earlier. For example,serviceAccountName: financeserviceaccount
. - Add
automountServiceAccountToken
and set it totrue
.
For example:
apiVersion: v1 kind: Pod metadata: name: nginx namespace: finance spec: serviceAccountName: financeserviceaccount automountServiceAccountToken: true containers: - name: nginx image: nginx:1.14.2 ports: - containerPort: 80
- Add
- Deploy the application by entering:
kubectl create -f <filename>
For example:kubectl create -f financeworkloadidentity.yaml