-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove UAMI #76
Comments
Hi @majguo I tried the command to create the service principal and got the following:
With my account, I was previously able to create a UAMI, so whilst this option looks more straightforward, I'm wondering if fewer people will be able to do it? Also, are we able to replace |
@gcharters and me have discussed the details and finally Gram agreed it's an improvement, details pls see https://ibm-cloud.slack.com/archives/G010BB252NA/p1668322984576439. |
@m_reza_rahman and I reviewed the UI with @majguo today. Plan of record is for Jianguo to create a PR and Ed will apply some copyediting to the UI text, but it is essentially ok as is. |
@majguo Hi, I reviewed the strings. Changes to the Basics tab look good. No suggested changes for the Basics tab. I suggest several changes for the Configure cluster tab:
|
Hello @helyarp Thanks for your review. The text strings have already been updated per review comments from @edburns and @m-reza-rahman. So may I ask you review it again? Sorry for the inconvenience caused. Notes
|
@majguo Hi, please remove the "below"; "below" is an accessibility violation. Is there any way to run the command and have the values put into the fields automatically? As to two "Confirm secret" labels, I suppose it's okay; we try to have unique labels but the info note divides the similar labels. |
@helyarp Thanks for your review, here is my response.
|
Description
To improve the usage of liberty-on-aro offer, @edburns initiated discussion with Azure Red Hat OpenShift team and they proposed the removal of uami which requires both permissions in subscription and Azure AD. Accordingly, user just needs to provide a service principal
clientId
andclientSecret
which can easily be retrieved from the output ofaz ad sp create-for-rbac --sdk-auth
command execution. We expect that this new approach would reduce friction and lead to an increase in ARO deployments.Preview UI changes
Reviewer can preview the UI changes using the Create UI Definition Sandbox:
createUiDefinition.json
.Screenshots
Old UI:
New UI:
The text was updated successfully, but these errors were encountered: