<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
</head>
<body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-family: Calibri, sans-serif; ">
<div>
<div>Thanks Brad. Appreciate it. I will read through once available and send our use case to Nash if it is not covered.</div>
<div><br>
</div>
<div>Thanks</div>
<div>Anand</div>
</div>
<div><br>
</div>
<span id="OLK_SRC_BODY_SECTION">
<div style="font-family:Calibri; font-size:11pt; text-align:left; color:black; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid; BORDER-RIGHT: medium none; PADDING-TOP: 3pt">
<span style="font-weight:bold">From: </span>Brad Topol <<a href="mailto:btopol@us.ibm.com">btopol@us.ibm.com</a>><br>
<span style="font-weight:bold">Reply-To: </span>OpenStack Development Mailing List <<a href="mailto:openstack-dev@lists.openstack.org">openstack-dev@lists.openstack.org</a>><br>
<span style="font-weight:bold">Date: </span>Fri, 26 Apr 2013 16:16:17 -0400<br>
<span style="font-weight:bold">To: </span>OpenStack Development Mailing List <<a href="mailto:openstack-dev@lists.openstack.org">openstack-dev@lists.openstack.org</a>><br>
<span style="font-weight:bold">Cc: </span>OpenStack Development Mailing List <<a href="mailto:openstack-dev@lists.openstack.org">openstack-dev@lists.openstack.org</a>><br>
<span style="font-weight:bold">Subject: </span>Re: [openstack-dev] [keystone] Suggested LDAP DIT for domains<br>
</div>
<div><br>
</div>
<font size="2" face="sans-serif">Hi Anand,</font><br>
<br>
<font size="2" face="sans-serif">Nash will have one available soon.</font><br>
<br>
<font size="2" face="sans-serif">Thanks,</font><br>
<br>
<font size="2" face="sans-serif">Brad</font><br>
<font size="2" face="sans-serif"><br>
Brad Topol, Ph.D.<br>
IBM Distinguished Engineer<br>
OpenStack<br>
(919) 543-0646<br>
Internet: <a href="mailto:btopol@us.ibm.com">btopol@us.ibm.com</a><br>
Assistant: Cindy Willman (919) 268-5296</font><br>
<br>
<br>
<br>
<font size="1" color="#5f5f5f" face="sans-serif">From: </font><font size="1" face="sans-serif">"Palanisamy, Anand" <<a href="mailto:apalanisamy@paypal.com">apalanisamy@paypal.com</a>></font><br>
<font size="1" color="#5f5f5f" face="sans-serif">To: </font><font size="1" face="sans-serif">OpenStack Development Mailing List <<a href="mailto:openstack-dev@lists.openstack.org">openstack-dev@lists.openstack.org</a>></font><br>
<font size="1" color="#5f5f5f" face="sans-serif">Date: </font><font size="1" face="sans-serif">04/26/2013 02:44 PM</font><br>
<font size="1" color="#5f5f5f" face="sans-serif">Subject: </font><font size="1" face="sans-serif">Re: [openstack-dev] [keystone] Suggested LDAP DIT for domains</font><br>
<hr noshade="">
<br>
<br>
<br>
<font size="2" face="Calibri">Agree with Brad. At PayPal, we have LDAP Servers in multiple environments (some are READ-only and driven by IDM) and we have implemented a solution today, but it is not cleaner though :(. It has to be driven by Single Keystone.</font><br>
<br>
<font size="2" face="Calibri">Brad,</font><br>
<br>
<font size="2" face="Calibri">Is there any blueprint that Nash put together for this? Please let me know.</font><br>
<br>
<font size="2" face="Calibri">Thanks</font><br>
<font size="2" face="Calibri">Anand</font><br>
<br>
<font size="2" face="Calibri"><b>From: </b>Brad Topol <</font><a href="mailto:btopol@us.ibm.com"><font size="2" color="blue" face="Calibri"><u>btopol@us.ibm.com</u></font></a><font size="2" face="Calibri">><b><br>
Reply-To: </b>OpenStack Development Mailing List <</font><a href="mailto:openstack-dev@lists.openstack.org"><font size="2" color="blue" face="Calibri"><u>openstack-dev@lists.openstack.org</u></font></a><font size="2" face="Calibri">><b><br>
Date: </b>Fri, 26 Apr 2013 10:52:12 -0400<b><br>
To: </b>OpenStack Development Mailing List <</font><a href="mailto:openstack-dev@lists.openstack.org"><font size="2" color="blue" face="Calibri"><u>openstack-dev@lists.openstack.org</u></font></a><font size="2" face="Calibri">><b><br>
Cc: </b>OpenStack Development Mailing List <</font><a href="mailto:openstack-dev@lists.openstack.org"><font size="2" color="blue" face="Calibri"><u>openstack-dev@lists.openstack.org</u></font></a><font size="2" face="Calibri">><b><br>
Subject: </b>Re: [openstack-dev] [keystone] Suggested LDAP DIT for domains</font><br>
<br>
<font size="2" face="sans-serif">I think we are mixing issues here. I want a single keystone to support authentication from multiple LDAPs. That is a critical use case we need and Henry Nash is looking into this. That is different from agreeing that each
LDAP should map to one and only one domain which reduces some keystone implementation nightmares. </font><font size="2" face="Calibri"><br>
</font><font size="2" face="sans-serif"><br>
Thanks,</font><font size="2" face="Calibri"><br>
</font><font size="2" face="sans-serif"><br>
Brad<br>
<br>
Brad Topol, Ph.D.<br>
IBM Distinguished Engineer<br>
OpenStack<br>
(919) 543-0646<br>
Internet: </font><a href="mailto:btopol@us.ibm.com"><font size="2" color="blue" face="sans-serif"><u>btopol@us.ibm.com</u></font></a><font size="2" face="sans-serif"><br>
Assistant: Cindy Willman (919) 268-5296</font><font size="2" face="Calibri"><br>
<br>
<br>
</font><font size="1" color="#5f5f5f" face="sans-serif"><br>
From: </font><font size="1" face="sans-serif">"Bhandaru, Malini K" <</font><a href="mailto:malini.k.bhandaru@intel.com"><font size="1" color="blue" face="sans-serif"><u>malini.k.bhandaru@intel.com</u></font></a><font size="1" face="sans-serif">></font><font size="1" color="#5f5f5f" face="sans-serif"><br>
To: </font><font size="1" face="sans-serif">OpenStack Development Mailing List <</font><a href="mailto:openstack-dev@lists.openstack.org"><font size="1" color="blue" face="sans-serif"><u>openstack-dev@lists.openstack.org</u></font></a><font size="1" face="sans-serif">></font><font size="1" color="#5f5f5f" face="sans-serif"><br>
Date: </font><font size="1" face="sans-serif">04/25/2013 05:27 PM</font><font size="1" color="#5f5f5f" face="sans-serif"><br>
Subject: </font><font size="1" face="sans-serif">Re: [openstack-dev] [keystone] Suggested LDAP DIT for domains</font><font size="2" face="Calibri"><br>
</font>
<hr noshade="">
<font size="2" face="Calibri"><br>
<br>
</font><font size="2" face="Calibri"><br>
Multiple LDAPS may be insanity but wonder about a use case where company-X and company-Y with their own respective LDAPs wants to use a public cloud. Or may be that is an external-auth type scenario (Keystone mentions it) and as far as OpenStack/keystone concerned,can
be agnostic of those LDAPs and we are all set.<br>
Malini<br>
<br>
-----Original Message-----<br>
From: Adam Young [</font><a href="mailto:ayoung@redhat.com"><font size="2" color="blue" face="Calibri"><u>mailto:ayoung@redhat.com</u></font></a><font size="2" face="Calibri">]
<br>
Sent: Thursday, April 25, 2013 7:46 AM<br>
To: </font><a href="mailto:openstack-dev@lists.openstack.org"><font size="2" color="blue" face="Calibri"><u>openstack-dev@lists.openstack.org</u></font></a><font size="2" face="Calibri"><br>
Subject: Re: [openstack-dev] [keystone] Suggested LDAP DIT for domains<br>
<br>
OK, so Ryan has convinced me that multiple LDAP servers under the same Keystone is an incantation for self induced insanity.<br>
<br>
Based on conversations with the other devs, we are going to enforce that there is only one LDAP server per keystone, and limit the number of domainsit can support to one.<br>
<br>
There can be only one.<br>
<br>
The APIs for Domains will still be implemented, but creating or modifying a domain will be return an Not implemented return code. There will be a single domain object that will be immutable, although we may allow initializing it from config file values.<br>
<br>
Why are we "yanking" a feature like this? Quite simply, because the vast majority of LDAP deployments out there will not use it, and will not support the approach we have started. We would rather focus on solving the real needs of the LDAP users. Most people
cannot write to their LDAP servers, and those that can often don't have the power to change the schema. Thus far, the LDAP work has kept this design in mind, but Domains forced us to marry up two inconstant views of the world.<br>
<br>
Multiple domains will still be supported in the SQL backend.<br>
<br>
Organizations that require multiple LDAP servers were not served by the existing implementation. Those will require a different solution. Each will get their own Keystone server, and we will use the approach sketched out in other blueprints to ensure that
they can co-exist in a single Open Stack deployment.<br>
<br>
<br>
<br>
On 04/24/2013 10:46 AM, Adam Young wrote:<br>
> On 04/24/2013 09:00 AM, Simo Sorce wrote:<br>
>> On Tue, 2013-04-23 at 15:26 -0700, Ryan Lane wrote:<br>
>>> <</font><a href="https://docs.google.com/file/d/0B96SIvDkZEUJU1JoZE8xTWh4UFk/edit?us"><font size="2" color="blue" face="Calibri"><u>https://docs.google.com/file/d/0B96SIvDkZEUJU1JoZE8xTWh4UFk/edit?us</u></font></a><font size="2" face="Calibri"><br>
>>> p=sharing><br>
>>><br>
>>><br>
>>><br>
>>> In the above, everything exists under ou=domains. In the case an <br>
>>> operator wants to use only one single (default) domain, they'dset <br>
>>> their configuration to use the root, rather than ou=domains, and <br>
>>> would move everything up a level. Otherwise, a default domain exists <br>
>>> as a normal domain in the tree.<br>
>>><br>
>>><br>
>>> In this DIT configuration, domains have roles and projects, projects <br>
>>> have roles. Projects and roles have members. I believe there was <br>
>>> discussion of implying membership in the project by membershipof <br>
>>> the roles. I'm not a huge fan of that, but I can modify this design <br>
>>> if that's the preferred approach.<br>
>>><br>
>>><br>
>>> There's some major benefits of designing the DIT in this way:<br>
>>><br>
>>><br>
>>> 1. It's possible to scope searches by depth and base to limit <br>
>>> searches to domains and project and to find roles for domains and projects.<br>
>>> 2. The DIT can be extended by LDAP administrators for other uses. I <br>
>>> can give you a ton of examples, as I'm doing this currently for <br>
>>> per-project sudoers, service and group users, etc..<br>
>>> 3. Users, groups, and projects have no requirements for being <br>
>>> globally unique. They are only unique per domain.<br>
>>> 4. For operators using the current implementation who don't want <br>
>>> multiple domains, this is backwards compatible.<br>
>>> 5. For operators wanting to using multiple domains, they simply need <br>
>>> to move their tree a level deeper. Of course this isn't a simple <br>
>>> change, but it should be a matter of configuration for their <br>
>>> applications, rather than development effort.<br>
>>> 6. Domains are a matter of hierarchy, and this uses LDAP's natural <br>
>>> hierarchy.<br>
>>><br>
>> It would be nice if this hierarchy were optional, for example you may <br>
>> have attributes with substitution rules that tell where the base for <br>
>> a domain is<br>
>><br>
>> Pseudo ini-style config:<br>
>> [domain]<br>
>> base = ou=%D,ou=domains<br>
>><br>
>> where %D is substituted with the domain name.<br>
>><br>
>><br>
>> This would allow people to flexibly define their DITs.<br>
>><br>
>> Another option could be to spawn a separate driver per domain with a <br>
>> template based configuration system (based again on substitutions), <br>
>> or a per domain explicit configuration.<br>
>> This way you could use either one or multiple LDAP servers at the <br>
>> same time as each domain could have a completely different configuration.<br>
>><br>
>> Simo.<br>
>><br>
><br>
> I wrote up this blueprint in support of the "separate driver per <br>
> domain" approach:<br>
><br>
> </font><a href="https://blueprints.launchpad.net/keystone/+spec/multiple-datastores"><font size="2" color="blue" face="Calibri"><u>https://blueprints.launchpad.net/keystone/+spec/multiple-datastores</u></font></a><font size="2" face="Calibri"><br>
><br>
> Which gives us a way to register the drivers. What it does not give <br>
> us is a domain registry. I suspect that the right way to do a domain <br>
> registry would be to use a either a flat file driver or the SQL Driver<br>
> as the Identity driver, and have a way to link to other drivers for <br>
> the individual domains. We could also put a domains section into the <br>
> config file, with a mapping of domain-id to driver, but that misses <br>
> all of the configuration options for each domain.<br>
><br>
> I also started this blueprint for extracting the binding information <br>
> from the config file for LDAP:<br>
> </font><a href="https://blueprints.launchpad.net/keystone/+spec/json-for-ldap"><font size="2" color="blue" face="Calibri"><u>https://blueprints.launchpad.net/keystone/+spec/json-for-ldap</u></font></a><font size="2" face="Calibri"><br>
><br>
> Which is probably a dupe of:<br>
><br>
> </font><a href="https://blueprints.launchpad.net/keystone/+spec/ldap-object-templates"><font size="2" color="blue" face="Calibri"><u>https://blueprints.launchpad.net/keystone/+spec/ldap-object-templates</u></font></a><font size="2" face="Calibri"><br>
><br>
> So we are thinking along the same ideas.<br>
><br>
> However, David Chadwick's attribute mapping approach might be a better<br>
> solution for complex mappings from LDAP. Kristy Siu had submitted it <br>
> back in decebmer, but it got nacked and abandoned.<br>
><br>
> </font><a href="https://review.openstack.org/#/c/18280/"><font size="2" color="blue" face="Calibri"><u>https://review.openstack.org/#/c/18280/</u></font></a><font size="2" face="Calibri"><br>
><br>
><br>
><br>
><br>
><br>
><br>
><br>
><br>
><br>
> _______________________________________________<br>
> OpenStack-dev mailing list<br>
> </font><a href="mailto:OpenStack-dev@lists.openstack.org"><font size="2" color="blue" face="Calibri"><u>OpenStack-dev@lists.openstack.org</u></font></a><font size="2" face="Calibri"><br>
> </font><a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev"><font size="2" color="blue" face="Calibri"><u>http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</u></font></a><font size="2" face="Calibri"><br>
<br>
<br>
_______________________________________________<br>
OpenStack-dev mailing list</font><font size="2" color="blue" face="Calibri"><u><br>
</u></font><a href="mailto:OpenStack-dev@lists.openstack.org"><font size="2" color="blue" face="Calibri"><u>OpenStack-dev@lists.openstack.org</u></font></a><font size="2" color="blue" face="Calibri"><u><br>
</u></font><a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev"><font size="2" color="blue" face="Calibri"><u>http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</u></font></a><font size="2" face="Calibri"><br>
<br>
_______________________________________________<br>
OpenStack-dev mailing list</font><font size="2" color="blue" face="Calibri"><u><br>
</u></font><a href="mailto:OpenStack-dev@lists.openstack.org"><font size="2" color="blue" face="Calibri"><u>OpenStack-dev@lists.openstack.org</u></font></a><font size="2" color="blue" face="Calibri"><u><br>
</u></font><a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev"><font size="2" color="blue" face="Calibri"><u>http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</u></font></a><font size="2" face="Calibri"><br>
</font><font size="2" face="Calibri"><br>
<br>
_______________________________________________ OpenStack-dev mailing list </font>
<a href="mailto:OpenStack-dev@lists.openstack.org"><font size="2" color="blue" face="Calibri"><u>OpenStack-dev@lists.openstack.org</u></font></a><font size="2" face="Calibri"></font><a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev"><font size="2" color="blue" face="Calibri"><u>http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</u></font></a><font size="2" face="Calibri"></font><tt><font size="2">_______________________________________________<br>
OpenStack-dev mailing list<br>
<a href="mailto:OpenStack-dev@lists.openstack.org">OpenStack-dev@lists.openstack.org</a><br>
</font></tt><a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev"><tt><font size="2">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</font></tt></a><tt><font size="2"><br>
</font></tt><br>
_______________________________________________ OpenStack-dev mailing list <a href="mailto:OpenStack-dev@lists.openstack.org">
OpenStack-dev@lists.openstack.org</a> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev">
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</a> </span>
</body>
</html>