Skip to content

docs: add storage saas deployment#348

Open
Iheanacho-ai wants to merge 1 commit intosiderolabs:mainfrom
Iheanacho-ai:omni-security-model-saas
Open

docs: add storage saas deployment#348
Iheanacho-ai wants to merge 1 commit intosiderolabs:mainfrom
Iheanacho-ai:omni-security-model-saas

Conversation

@Iheanacho-ai
Copy link
Member

No description provided.

Signed-off-by: Amarachi Iheanacho <amarachi.iheanacho@siderolabs.com>
@talos-bot talos-bot moved this to In Review in Planning Feb 4, 2026
This document explains how access is enforced in Omni-managed environments, including Talos Linux nodes and Kubernetes clusters.

When clusters and machines are managed by Omni, Omni becomes the central point of access for all the resources it controls. This includes access to Talos, Kubernetes, and Omni-specific resources.
When clusters and machines are managed by Omni, Omni becomes the central control plane for access to Talos, Kubernetes, and Omni-specific APIs.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think "control plane" is too easy to get confused with Kubernetes. "point of access" IMO is more clear on what Omni is doing. You could even call it an authentication proxy. But control plane is too easy to confuse.

Omni supports non-interactive access through a programming language or the official Omni client, `omnictl`. When user authentication is used, Omni issues short-lived credentials. Tokens can remain valid for up to eight hours, and Omni-generated public keys expire after four hours. These limits are fixed and cannot be configured.
Service accounts provide non-interactive access to the Omni API for automation and CI/CD workflows.

Unlike user authentication, which issues short-lived credentials, service accounts use long-lived tokens that do not require periodic reauthentication through an identity provider. Tokens can remain valid for up to eight hours, and Omni-generated public keys expire after four hours. These limits are fixed and cannot be configured.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is confusing because you say "tokens that do not require periodic reauthentication" and "Tokens can remain valid for up to eight hours"

We should say there is a difference between "Service Account tokens" and "User tokens"


## Data protection in Omni SaaS deployments

When deployed as a SaaS offering, Omni encrypts all persisted customer account data at rest using AES-256. This includes cluster configuration, machine metadata, certificates, and encryption material.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It also encrypts in transit via TLS communication.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

Status: In Review

Development

Successfully merging this pull request may close these issues.

3 participants