Jump To Close Expand all Collapse all Table of contents Security and compliance 1. Viewing audit logs Expand section "1. Viewing audit logs" Collapse section "1. Viewing audit logs" 1.1. About the API audit log 1.2. Viewing the audit logs 1.3. Filtering audit logs 1.4. Gathering audit logs 1.5. Additional resources 2. Adding additional constraints for IP-based AWS role assumption Expand section "2. Adding additional constraints for IP-based AWS role assumption" Collapse section "2. Adding additional constraints for IP-based AWS role assumption" 2.1. Create an identity-based IAM policy 2.2. Attaching the identity-based IAM policy 2.3. Additional resources Legal Notice Settings Close Language: English 简体中文 日本語 한국어 Language: English 简体中文 日本語 한국어 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English 简体中文 日本語 한국어 Language: English 简体中文 日本語 한국어 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Security and compliance Red Hat OpenShift Service on AWS 4Configuring security context constraints on AWS clustersRed Hat OpenShift Documentation TeamLegal NoticeAbstract This document provides instructions for configuring security context constraints. Next