|
6 | 6 | [id="rosa-govcloud-fedramp-signup_{context}"] |
7 | 7 | = Signing up for a Red Hat FedRAMP account |
8 | 8 |
|
| 9 | +[role="_abstract"] |
9 | 10 | To access {product-title} in AWS GovCloud, you must sign up for a Red{nbsp}Hat FedRAMP account. |
10 | 11 |
|
11 | 12 | .Procedure |
12 | | -. Navigate to link:https://console.redhat.com/openshift/create/rosa/govcloud[]. |
| 13 | +. Navigate to link:https://console.redhat.com/openshift/create/rosa/govcloud[the ROSA GovCloud access request form]. |
13 | 14 | . Complete the access request form. |
14 | | -. Click *Submit* to sign up. |
| 15 | +. Click *Submit* to sign up. You will receive a _Submission confirmation_. |
15 | 16 | + |
16 | | -You will receive a _Submission confirmation_. |
17 | | - |
18 | 17 | Red{nbsp}Hat's confirmed stateside support team will contact you through email for the following information: |
19 | | - |
20 | | -* *Admin details* to include your _organization name_, _administrator first and last name_ and _administrator email_. |
21 | | -
|
| 18 | ++ |
| 19 | +* *Admin details* to include your _organization name_, _administrator first and surname_ and _administrator email_. |
22 | 20 | * *User authentication* option to the FedRAMP {hybrid-console-second} from one of the following two options: |
23 | | -
|
24 | | -** _Local group in a Red{nbsp}Hat managed Keycloak instance_, where users will be required to setup multi-factor authentication (MFA) with an approved device. |
| 21 | +** _Local group in a Red{nbsp}Hat managed Keycloak instance_, where users will be required to setup multifactor authentication (MFA) with an approved device. |
25 | 22 | + |
26 | | -==== |
27 | 23 | [NOTE] |
| 24 | +==== |
28 | 25 | Only device link:https://www.yubico.com/product/yubikey-5c-nfc-fips[YubiKEY 5C NFC FIPS] currently accepted. |
29 | 26 | ==== |
| 27 | ++ |
30 | 28 | ** _Customer managed Identity Provider (IdP), integrated via OpenID Connect (OIDC)_, where you will need to provide the following: |
31 | 29 | *** *Discovery Endpoint:* The IdP's OIDC discovery URL (typically ending in _/.well-known/openid-configuration_). This allows Keycloak to automatically fetch most of the IdP's settings. |
32 | 30 | *** *Client ID and secret:* Credentials that allow Keycloak to authenticate with the customer's IdP. |
33 | 31 | *** *Email domain(s):* A list of approved email domains. Only users with an email address from one of these domains will be allowed to log in. |
34 | | -*** *Essential claim:* A specific key-value pair (e.g., _"rh-approved": "true"_) that must be present in a user's token from the IdP to grant them access. |
35 | | -+ |
36 | | -In this configuration, the customer takes on the responsibility for implementing FIPS 140-2 validated MFA. |
| 32 | +*** *Essential claim:* A specific key-value pair (e.g., _"rh-approved": "true"_) that must be present in a user's token from the IdP to grant them access. In this configuration, the customer takes on the responsibility for implementing FIPS 140-2 validated MFA. |
37 | 33 |
|
38 | 34 |
|
39 | 35 | // Following process with a sign up button will not be available until https://issues.redhat.com/browse/CRCPLAN-397 is complete. |
|
0 commit comments