[openstack-dev] 回复： [keystone federation] some questions aboutkeystone IDP with SAML supported
93425129 at qq.com
Thu Oct 15 05:22:41 UTC 2015
John, I agree with you. Keystone is not a general purpose federated IdP.
"Web application could use SAML HTTP-Redirect or it could also function as an ECP client."
Now Keystone supports token, saml2, oauth1. There is aslo a keystone plugin project try to support oauth2. But Keystone's goal is not to support Web SSO
BTW, if I still want to utilize Keystone, such as token authentication and SCIM and integration with LDAP functionalities.
Could I use some SAMLv2 SSO Server, such as UAA or WSO2 Identity Server , to integrate with Keystone?
the case maybe like this:
A Java Service Provider ==SAMLv2 SSO==>UAA/WSO2 Identity Server
UAA/WSO2 Identity Server ==IDP integrate with==> Keystone ==datastore==>LDAP
Certainly, A Java Service Provider ==> UAA/WSO2 Identity Server ==> LDAP
maybe make sense.
I means , Could we integrate any SSO Server for Keystone solution?
I think it can do by implementing a java websso service, that integrated with Keystone's token auth. Although it is not a standard SAMLv2 IDP solution.
Java SP ==sso==> Java WEBSSO Service(RestAPI) ==token==> Keystone(token auth/SCIM API)
Thanks for more help.
------------------ 原始邮件 ------------------
发件人: "John Dennis";<jdennis at redhat.com>;
发送时间: 2015年10月15日(星期四) 凌晨1:05
收件人: "OpenStack Development Mailing List (not for usage questions)"<openstack-dev at lists.openstack.org>; "wyw"<93425129 at qq.com>;
主题: Re: [openstack-dev] [keystone federation] some questions aboutkeystone IDP with SAML supported
On 10/14/2015 07:10 AM, wyw wrote:
> hello, keystoners. please help me
> Here is my use case:
> 1. use keystone as IDP , supported with SAML
> 2. keystone integrates with LDAP
> 3. we use a java application as Service Provider, and to integrate it
> with keystone IDP.
> 4. we use a keystone as Service Provider, and to integrate it withe
> keystone IDP.
Keystone is not an identity provider, or at least it's trying to get out
of that business, the goal is to have keystone utilize actual IdP's
instead for authentication.
K2K utilizes a limited subset of the SAML profiles and workflow.
Keystone is not a general purpose SAML IdP supporting Web SSO.
Keystone implements those portions of various SAMLv2 profiles necessary
to support federated Keystone and derive tokens from federated IdP's.
Note this distinctly different than Keystone being a federated IdP.
> The problems:
> in the k2k federation case, keystone service provider requests
> authentication info with IDP via Shibboleth ECP.
Nit, "Shibboleth ECP" is a misnomer, ECP (Enhanced Client & Proxy) is a
SAMLv2 profile, a SAML profile Shibboleth happens to implement, however
there other SP's and IdP's that also support ECP (e.g. mellon, Ipsilon)
> in the java application, we use websso to request IDP, for example：
> idp_sso_endpoint = http://10.111.131.83:5000/v3/OS-FEDERATION/saml2/sso
> but, the java redirect the sso url , it will return 404 error.
> so, if we want to integrate a java application with keystone IDP,
> should we need to support ECP in the java application?
You're misapplying SAML, Keystone is not a traditional IdP, if it were
your web application could use SAML HTTP-Redirect or it could also
function as an ECP client, but not against Keystone. Why? Keystone is
not a general purpose federated IdP.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the OpenStack-dev