ironic/doc/source/admin/agent-token.rst
Muhammad Ahmad 7e85b3ed4d doc/source/admin fixes part-1
This a continuation to the efforts to ensure that the documentation is free from typos and grammatical mistakes so that the reader is not confused. Includes fixes for some of the documentation in doc/source/admin/*

Change-Id: I9ff40f1982ffad86a41e44395b6bee3a8dbfe43a
2024-09-15 10:33:49 +00:00

83 lines
2.9 KiB
ReStructuredText

.. _agent_token:
===========
Agent Token
===========
Purpose
=======
The concept of agent tokens is to provide a mechanism by which the
relationship between an operating deployment of the Bare Metal Service
and an instance of the ``ironic-python-agent`` is verified. In a sense,
this token can be viewed as a session identifier or authentication token.
.. warning::
This functionality does not remove the risk of a man-in-the-middle attack
that could occur from connection intercept or when TLS is not used for
all communication.
This becomes useful in the case of deploying an "edge" node where intermediate
networks are not trustworthy.
How it works
============
These tokens are provided in one of two ways to the running agent.
1. A pre-generated token that is embedded into virtual media ISOs.
2. A one-time generated token that is provided upon the first "lookup"
of the node.
In both cases, the tokens are randomly generated using the Python
``secrets`` library. As of mid-2020, the default length is 43 characters.
Once the token has been provided, the token cannot be retrieved or accessed.
It remains available to the conductors and is stored in the memory of the
``ironic-python-agent``.
.. note::
In the case of the token being embedded with virtual media, it is read
from a configuration file within the image. Ideally, this should be paired
with Swift temporary URLs.
With the token is available in memory in the agent, the token is embedded with
``heartbeat`` operations to the ironic API endpoint. This enables the API to
authenticate the heartbeat request, and refuse "heartbeat" requests from the
``ironic-python-agent``. As of the Victoria release, the use of Agent Token is
required for all agents and the previously available setting to force this
functionality to be mandatory, ``[DEFAULT]require_agent_token`` has been removed
and no longer has any effect.
.. warning::
If the Bare Metal Service is updated, and the version of
``ironic-python-agent`` should be updated to enable this feature.
In addition to heartbeats being verified, commands from the
``ironic-conductor`` service to the ``ironic-python-agent`` also include the
token, allowing the agent to authenticate the caller.
With Virtual Media
------------------
.. figure:: ./../images/agent-token-with-virtual-media.svg
:width: 100%
With PXE/iPXE/etc.
------------------
.. figure:: ./../images/agent-token-with-pxe-ipxe.svg
:width: 100%
Agent Configuration
===================
An additional setting that may be leveraged with the ``ironic-python-agent``
is a ``agent_token_required`` setting. Under normal circumstances, this
setting can be asserted via the configuration supplied from the Bare Metal
service deployment upon the ``lookup`` action but can be asserted via the
embedded configuration for the agent in the ramdisk. This setting is also
available via the kernel command line as ``ipa-agent-token-required``.