This guide describes how to manually configure OIDC Workload Identity Federation between a CKS cluster and AI Object Storage. The resulting pod gets a projected service account token that it exchanges for temporary S3 credentials at runtime. You can do this automatically with very little configuration by installing the Pod Identity Webhook. Use this guide when you need full control over the token exchange or for debugging.Documentation Index
Fetch the complete documentation index at: https://docs.coreweave.com/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
Prior to completing these steps, the following prerequisites need to be in place: In your CoreWeave organization, you need to have the following:- A deployed CKS cluster with OIDC Workload Identity enabled.
- A user with the appropriate permissions to create and deploy AI Object Storage buckets and policies. These are enabled using an IAM Access Policy tied to the principal with the Object Storage Admin role, or an AI Object Storage organization access policy that grants the following permissions:
s3:CreateBucket,cwobject:CreateAccessKey,cwobject:EnsureAccessPolicy,cwobject:ListAccessPolicy,cwobject:DeleteAccessPolicy.
- A terminal. This tutorial is written for bash and zsh.
kubectlinstalled and accessible from your terminal path.- An S3 CLI client installed and accessible from your terminal path. This guide uses the AWS CLI but any S3 CLI should work.
Configure the CKS OIDC provider
Register your CKS cluster as a trusted OIDC identity provider for AI Object Storage. This enables pods running in the cluster to exchange their projected service account tokens for temporary S3 credentials.- Launch your CKS cluster.
- In the Cloud Console, retrieve the OIDC Issuer URL for your CKS cluster:
- Go to the Clusters page.
- Click the name of your desired cluster. A cluster details panel opens on the right.
- Copy the OIDC Issuer URL from the Overview section.
- Configure OIDC Workload Identity Federation in the Cloud Console using this OIDC Issuer URL.
- Note: Your organization must be flagged for this feature.
- Create a new OIDC Configuration in the Workload Federation page.
- Click Create OIDC configuration. The configuration form opens.
- Set the configuration name (choose a name that indicates it is for federating CKS tokens with AI Object Storage).
- Enter the CKS cluster’s OIDC Issuer URL that you copied earlier into both the Issuer URL and Client ID (Audience) fields.
- Click Create to save the configuration.
Configure kubectl and create a Kubernetes service account
-
Download a kubeconfig for your CKS cluster:
- Go to the Tokens page.
- Click Create Token. The token creation form opens.
- Set the context for your cluster.
- Click Download to download the kubeconfig.
-
Using the kubeconfig you downloaded, export an environment variable that
kubectlwill use to locate your kubeconfig. Fill in the path to the kubeconfig file you downloaded: -
Test that your
kubectlinstallation is working:If the environment variable is set properly, you should see the context you downloaded for your CKS environment from yourkubeconfig.yamlfile and you should see running nodes for your CoreWeave environment. -
Create a Kubernetes service account by creating a
.yamlfile with the following data and saving it to a file namedtest-service-account.yaml:test-service-account.yaml -
Create the account:
-
Verify the account has been created:
If successful,
test-service-accountwill be visible.
Grant the service account access to Object Storage
You must grant the service account’s federated identity access to AI Object Storage through an organization access policy. Use the OIDC Issuer URL you copied earlier and the service account name to construct the WIF principal:[OIDC-ISSUER-URL] with the OIDC Issuer URL from your cluster’s details panel.
The following example policy grants the service account full S3 access to all buckets in your organization:
Set up the workload
- You can define AI Object Storage policies referencing a role of the form
<issuer>:<subject>where the issuer is discovered via the well-known URL and subject follows a standard pattern for Kubernetes service accounts, based on namespace and service account name. - To get the OIDC well-known URL, you can go to the Cloud Console and navigate to Clusters -> [Your Cluster Name], and copy the OIDC Issuer URL.
| Principal Type | Syntax |
|---|---|
| Principal | [OIDC-ISSUER-URL]:system:serviceaccount:default:test-service-account |
Org Policy "principals" | ["role/[OIDC-ISSUER-URL]:system:serviceaccount:default:test-service-account"] |
Bucket Policy "Principal" | {"AWS": "arn:aws:iam::[ORG-ID]:role/[OIDC-ISSUER-URL]:system:serviceaccount:default:test-service-account"} |
Create the workload pod
Create a pod manifest that mounts a projected service account token with the correct audience. The pod uses this token to exchange for temporary AI Object Storage credentials at runtime. Replace[OIDC-ISSUER-URL] with the OIDC Issuer URL you copied from your cluster’s details panel, and replace [YOUR-CONTAINER-IMAGE] with your application’s container image:
To work with AI Object Storage, you need to configure your Pod’s S3 endpoints to use virtual addressing style and set the appropriate endpoint URL.
Configure S3 Endpoints for Pods
Configure S3 Endpoints for Pods
Because the environment variables handle credential exchange, your application only needs to configure the S3 endpoint and addressing style. For example, with the AWS CLI:Alternatively, this file can be mounted into the container from a ConfigMap, with the Use the LOTA endpoint (
AWS_CONFIG_FILE variable set to the location of the mounted file.cwlota.com) when your workloads run inside a CKS cluster for optimal performance. For more configuration options (Boto3, s3cmd, Multi-Storage Client), see Attaching endpoints.workload-pod.yaml
-
Apply the manifest:
/var/run/secrets/tokens/oidc-token inside the pod. AWS SDKs and the AWS CLI automatically use the AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE and AWS_CONTAINER_CREDENTIALS_FULL_URI environment variables to exchange the OIDC token for temporary S3 credentials. Credentials rotate automatically based on expirationSeconds.
Verify the setup (optional)
To confirm the projected token exchange works before deploying your real workload, create a test pod using theamazon/aws-cli image:
test-manual-pod.yaml
-
Apply the test pod:
-
Check the pod logs for the response:
If your OIDC configuration and organization access policies are configured correctly, you should see a JSON response listing your buckets. If you see an
AccessDeniederror, verify that your organization access policies grant thes3:ListAllMyBucketsaction to the correct WIF principal. -
Clean up the test pod:
Validate locally (optional)
You can also validate the OIDC token exchange from your local machine, outside of a Kubernetes pod, by creating a service account token and calling the credential endpoint directly. This is useful for one-time testing and debugging. Additional local prerequisites:curlfor calling the credential endpoint.jqfor parsing JSON responses.- jwt.io (optional) for inspecting OIDC token contents.
Test that the Service Account Token can authenticate
Test access with the AWS CLI
Configure a local AWS CLI profile to useauth.sh as the credential process. These commands set the virtual addressing style, set the credential process, set the region, and set the endpoint URL in a new profile called cw-test:
Use the primary endpoint (
https://cwobject.com) for local testing because the LOTA endpoint (http://cwlota.com) is only accessible from within CoreWeave clusters.Next steps
- To use the automatic method instead, see Automatic authentication with the Pod Identity Webhook.
- Learn more about OIDC Workload Identity for CKS.
- Learn more about Workload Identity Federation for AI Object Storage.