Documentation Index
Fetch the complete documentation index at: https://docs.controlplane.com/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Follow the steps below to create an identity within your GVC.Prerequisites
- Review the identity reference page
- Permissions to create an identity
- Optional:
- Install the CLI
Create using the UI Console
Follow the steps below to create an identity (requires a GVC):- Create a new identity using one of the following methods:
- Clicking
Identitiesin the left menu and clickNew, or - Click the
Createdropdown in the upper right corner and selectIdentity.
- Clicking
- Enter a unique name and optional description.
- Under
Cloud Accessin the left pane, select the cloud provider (AWS,Azure,GCP, orNATS) to configure a cloud access rule. Requires at least one cloud account for the chosen provider. This step is optional. See Cloud Access for details. - Under
Cloud Wormholein the left pane, configure private network connectivity. This step is optional. See Network Resource for details.- Select
FQDN Resourcesand clickAdd FQDNto add resources by domain name. - Select
IP Resourcesand clickAdd IPto add resources by IP address.
- Select
- Under
Native Networkingin the left pane, configure cloud-native private connectivity. This step is optional. See Native Networking for details.- Select
AWS PrivateLinkand clickAdd AWS Resourceto configure an AWS PrivateLink endpoint. - Select
GCP Service Connectand clickAdd GCP Resourceto configure a GCP Private Service Connect endpoint.
- Select
- Optionally, select
Tagsfrom the left pane to add tags. - Click
Create. - The identity has been successfully created and the identity info page will be shown. This identity will now be available for use within your workload’s identity setting.
Cloud Access
The cloud access portion of an identity defines cloud resource access rules across one account in each of AWS, GCP and Azure. In other words, you can create an identity that allows access to several resources in a particular AWS account and a particular Azure account, but not in two separate Azure accounts. When defining the policy for a particular cloud provider, Control Plane creates and manages (using the registered cloud account) the following object at each cloud provider which acts as a “synthetic identity”:- AWS
- Role
- Azure
- App registration
- GCP
- Service Account
AWS
To set up an AWS cloud access policy, selectAWS under Cloud Access in the left pane.
- Select one of the registered AWS cloud accounts
-
Select one of the following methods and click
Next:- Reuse an existing AWS role:
- A list of roles will be shown.
- Either select a role from the list or click the
Edit Manuallybutton and enter a role name. ClickConfirm Manual Inputwhen done. - Verify the role name is correct and click
Done.
- Configure a new AWS role with existing policies:
- A list of available policies will be shown.
- The policy list can be created by:
- Selecting at least one role from the list, or
- Click the
Set Policies Manuallybutton and manually enter the policy name and clickAdd. Multiple policies can be added manually. ClickSet Policies From Listto return to the existing policies list. - Click
Done.
- Reuse an existing AWS role:
Save. If a new AWS role was selected, Control Plane will provision a new role in AWS that will be named the same as the Object Name shown in the Info page of the identity.
Azure
To set up an Azure cloud access policy, selectAzure under Cloud Access in the left pane.
- Select one of the registered Azure cloud accounts.
- Click
Next. - Construct the role assignments:
- Click
Select Scopeto show the scope selection wizard. Choose the service, region, type, and scope. ClickConfirm. - Click
Select Rolesto show the list of available roles for the selected scope. Select one or more roles. ClickConfirm. - If additional role assignments are needed, click
Add Assignmentat the top of the modal. Repeat the first two steps. - Click
Done.
- Click
Save. Control Plane will provision a new App registration in Azure that will be named the same as the Object Name shown in the Info page of the identity.
GCP
To set up a GCP cloud access policy, selectGCP under Cloud Access in the left pane.
- Select one of the registered GCP cloud accounts
-
Select one of the following methods and click
Next:- Reuse an existing GCP service account:
- A list of service accounts will be shown.
- Either select a service account from the list or click the
Edit Manuallybutton and enter a service account name. ClickConfirm Manual Inputwhen done. - Verify the service account name is correct and click
Done.
- Configure a new GCP service account:
- Construct a new binding:
- Click
Select Resourceto show the resource selection wizard. Choose the service, region, type, and resource. ClickConfirm. - Click
Select Rolesto show the list of available roles for the selected resource. Select one or more roles. ClickConfirm. - If additional bindings are needed, click
Add Bindingat the top of the modal. Repeat the first two steps. - Click
Done
- Click
- Construct a new binding:
- Reuse an existing GCP service account:
Save. If a new service account was selected, Control Plane will provision the new Service Account in GCP that will be named the same as the Object Name shown in the Info page of the identity.
Network Resource
The network resource portion of an identity defines network traversal rules from workloads into specific endpoints in private networks (e.g., a VPC). Tunneling network traffic from workloads to specific TCP hosts and ports is facilitated using agents deployed within the private network. This capability is referred to as “Cloud Wormhole”. UnderCloud Wormhole in the left pane, choose the resource type:
FQDN Resources
SelectFQDN Resources and click Add FQDN to add a resource by domain name.
- Select a registered agent matching the environment you’d like to access.
-
Enter a unique
namefor this resource.This name will be the hostname your workload will use when calling this resource. - Enter the FQDN of the internal resource.
- Optionally, enter the internal IP address that the FQDN will resolve to.
- Enter at least one port that the resource exposes.
The internal resource can be called by the workload using either the FQDN or the
name entered in step 2. If the internal resource is configured with TLS, the FQDN must be used.IP Resources
SelectIP Resources and click Add IP to add a resource by IP address.
- Select a registered agent matching the environment you’d like to access.
-
Enter a unique
namefor this resource.This name will be the hostname your workload will use when calling this resource. - Enter at least one IP address.
- Enter at least one port.
A maximum of 5 ports can be added per resource.
Create.