len548 commented on code in PR #9223:
URL: https://github.com/apache/ozone/pull/9223#discussion_r2519110536


##########
hadoop-hdds/docs/content/design/ozone-sts.md:
##########
@@ -0,0 +1,187 @@
+---
+title: AWS STS Design for Ozone S3
+summary: STS Support in Ozone
+date: 2026-10-30
+jira: HDDS-13323
+status: implementing
+author: Ren Koike, Fabian Morgan
+---
+<!--
+  Licensed under the Apache License, Version 2.0 (the "License");
+  you may not use this file except in compliance with the License.
+  You may obtain a copy of the License at
+
+   http://www.apache.org/licenses/LICENSE-2.0
+
+  Unless required by applicable law or agreed to in writing, software
+  distributed under the License is distributed on an "AS IS" BASIS,
+  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  See the License for the specific language governing permissions and
+  limitations under the License. See accompanying LICENSE file.
+-->
+
+# AWS STS Design for Ozone S3
+
+# 1. Introduction
+
+S3 credentials used to communicate with Ozone S3 APIs are based on a Kerberos 
identity.
+
+Historically, the Ozone community has had interest in a REST API capable of 
programmatically generating 
+temporary S3 credentials.
+
+Amazon AWS has the [Security Token Service 
(STS)](https://docs.aws.amazon.com/STS/latest/APIReference/welcome.html) which 
+provides the ability to generate short-lived access to resources.
+
+The primary scope of this document is to detail the initial implementation of 
STS within the Ozone ecosystem.
+
+# 2. Why Use STS Tokens?
+
+Providing short-lived access to various resources in Ozone is useful in 
scenarios such as Data Lake
+solutions that want to aggregate data across multiple cloud providers.
+
+# 3. How Ozone STS Works
+
+The initial implementation of Ozone STS supports only the 
[AssumeRole](https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html)
+API from the AWS specification.  A new STS endpoint `/sts` on port `9880` will 
be created to service STS requests in the S3 Gateway.

Review Comment:
   Another reason we should have STS in a separate port is that even AWS have 
different process for STS than generating permanent AWS credentials within IAM. 
To align with AWS way of supporting them, I think it's logically right to 
separate them. But the point you mentioned is also fully understandable and I 
am not sure which one should  be prioritized.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to