<div dir="ltr"><div class="gmail_default" style="font-size:small">Hi everyone,</div><div class="gmail_default" style="font-size:small"><br></div><blockquote style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex" class="gmail_quote"><span style="font-size:12.6666669845581px">Enrique, if you have a github repo or some project pages you can point<br></span><span style="font-size:12.6666669845581px">me to that would be wonderful. I'm currently in the very early stages of<br></span><span style="font-size:12.6666669845581px">our proof of concept/prototype, so it would be great to see some work<br></span><span style="font-size:12.6666669845581px">others have done to solve similar issues. If I can find something that<br></span><span style="font-size:12.6666669845581px">works for a few of our use cases it might be a better starting point or<br></span><span style="font-size:12.6666669845581px">good to see what an approach others might find useful is.</span><br style="font-size:12.6666669845581px"><span style="font-size:12.6666669845581px">I'd much rather not duplicate work, nor build something only useful for<br></span><span style="font-size:12.6666669845581px">our use cases, so collaboration towards a community variant would be ideal.</span></blockquote><div><br></div><div><div class="gmail_default" style="font-size:small;display:inline">Adrian, first of all we are currently working in this functionality so we don't have a final version yet, that's why we are also interested in joining efforts and collaborate in a community variant. Anyway, </div>our first prototype was to do it all in Horizon, implementing a django app similar to what you can find in <a href="https://django-registration.readthedocs.org/en/latest/">django registration</a>. Currently <div class="gmail_default" style="font-size:small;display:inline">I am</div> working in moving all the backend logic to a keystone extension and keeping the views and form handling in a django app to make something similar to the <a href="https://github.com/openstack/django_openstack_auth">current authentication system</a><div class="gmail_default" style="font-size:small;display:inline">.</div> </div><div><div class="gmail_default" style="display:inline">You can check <a href="https://github.com/ging/keystone/tree/registration/keystone/contrib/user_registration">here</a> our current keystone extension if that helps you.</div></div><div><div class="gmail_default" style="font-size:small;display:inline"><br></div></div><div><div class="gmail_default" style="font-size:small;display:inline">Getting into the details, we went for a slightly different approach to the one you propose. Our idea is to have a service in keystone that exposes and API to register and activate users, as well as other common functionality like password reset, etc. This API is admin only, so Horizon(or whoever wants to register users) needs to have its own admin credentials to use it. If I understand correctly, what you suggest is that is the service the one that would have the credentials, so we differ here. I see some benefits and disadvantages in both approaches, we can discuss them if you want. </div></div><div><div class="gmail_default" style="font-size:small;display:inline"><br></div></div><div><div class="gmail_default" style="font-size:small;display:inline">Secondly, the way we handle temporary user data is setting the enabled attribute to False until they get activated using a key provided during registration. In other words, our extension is a 'delayed user-create API for admins' with some extra functionality like password reset. What do you think about this approach? How do you plan to store this temporal data?</div></div><div><br></div><div><div class="gmail_default" style="font-size:small;display:inline">It would be great if you can provide any feedback on all of this, like how well do you think it integrates with the current ecosystem and how would you do things differently.</div></div><div><div class="gmail_default" style="font-size:small;display:inline"><br></div></div><div><div class="gmail_default" style="font-size:small;display:inline">David, is this approach somewhat redundant with the federated Keystone code you are working on? I feel like they address different use cases but I might be looking at it the wrong way.</div></div><div><div class="gmail_default" style="font-size:small;display:inline"><br></div></div><div><div class="gmail_default" style="font-size:small">regards,</div><div class="gmail_default" style="font-size:small">Enrique Garcia Navalon</div><br></div><div><div class="gmail_default" style="font-size:small;display:inline"><br></div></div></div><div class="gmail_extra"><br><div class="gmail_quote">On 16 January 2015 at 15:12, David Chadwick <span dir="ltr"><<a href="mailto:d.w.chadwick@kent.ac.uk" target="_blank">d.w.chadwick@kent.ac.uk</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">The VO code exists already, as does a public demo (see my original email<br>
for details). I gave demos to the Keystone core in Paris last November.<br>
How soon this gets incorporated into core depends upon public/user<br>
demand. So far, it seems that few people have recognised the value of<br>
this service, probably because they are not using federated Keystone<br>
seriously. Once they do, I believe that the need for user self<br>
registration to roles and privileges will become immediately apparent<br>
<br>
regards<br>
<span class="HOEnZb"><font color="#888888"><br>
David<br>
</font></span><div class="HOEnZb"><div class="h5"><br>
On 15/01/2015 23:28, Adrian Turjak wrote:<br>
> Typo fix, see below.<br>
><br>
> On 16/01/15 12:26, Adrian Turjak wrote:<br>
>> Hello David,<br>
>><br>
>> We are definitely assessing the option, although even switching Keystone<br>
>> to be backed by an LDAP service might also work, and not be a switch to<br>
>> a fully federated system. I believe Keystone has had LDAP support since<br>
>> Havana, and that was an option we had looked at. It also might be a<br>
>> terrible option, we don't know yet, and would still mean dealing with<br>
>> LDAP directly anyway for user management.<br>
>><br>
>> What seems weird though with a federated Keystone system though is that<br>
>> you still have to store role and group information in Keystone so that<br>
>> has to be propagate through somehow, or be automated in some way still<br>
>> via an external service.<br>
>><br>
>> We don't at present have any concrete plans, and until now a pressing<br>
>> need to do so hasn't come up, although there were always plans to.<br>
>><br>
>> As for the VO roles blueprint, how likely is that to be merged into<br>
>> master, and are there any implementations of it? I assume the VO<br>
>> entities mentioned in the proposal would be in Keystone, yes?<br>
>><br>
>> We need a solution in the next few months (ideally sooner), but while<br>
>> building a quick hack of a service along Keystone could likely be done<br>
>> quickly<br>
> , that wouldn't be a good long term solution.<br>
><br>
>><br>
>> Cheers,<br>
>> -Adrian<br>
>><br>
>> On 15/01/15 21:20, David Chadwick wrote:<br>
>>> Hi Adrian<br>
>>><br>
>>> Morgan is right in saying that an external IdP would solve many of your<br>
>>> user management problems, but then of course, you will be using<br>
>>> federated keystone which you seem reluctant to do :-) However, if you<br>
>>> have an IdP under your full control then you can allow users to self<br>
>>> register and reset their passwords.<br>
>>><br>
>>> The next problem you will then face, is user authorisation - as opposed<br>
>>> to user authentication. The VO roles blueprint that we have worked on<br>
>>> addresses the authorisation problem. So when you are ready for this, let<br>
>>> me know<br>
>>><br>
>>> regards<br>
>>><br>
>>> David<br>
>>><br>
>>> On 15/01/2015 00:42, Morgan Fainberg wrote:<br>
>>>>><br>
>>>>> On Jan 13, 2015, at 9:06 PM, Adrian Turjak <<a href="mailto:adriant@catalyst.net.nz">adriant@catalyst.net.nz</a>> wrote:<br>
>>>>><br>
>>>>> Hello openstack-dev,<br>
>>>>><br>
>>>>> I'm wondering if there is any interest or need for an open-source user<br>
>>>>> registration and management service for people using OpenStack.<br>
>>>>><br>
>>>>> We're currently at a point where we need a way for users to sign up<br>
>>>>> themselves, choose their own password, and request new users to be added<br>
>>>>> to their project. There doesn't seem to be anything out there, and most<br>
>>>>> vendors seem to have built their own systems to handle this or even<br>
>>>>> their own dashboard systems that do.<br>
>>>>><br>
>>>>> Horizon is built around the client tools, and your own personal token,<br>
>>>>> so it can't handle creating new users. Plus Keystone doesn't really have<br>
>>>>> any good way of handling temporary (unapproved) users and projects.<br>
>>>>><br>
>>>>> The suggested approach seems to be to build a service to sit along<br>
>>>>> Keystone, have it's own admin creds so it can create new users, and also<br>
>>>>> store temp user data locally until the user is approved.<br>
>>>>><br>
>>>>> Unless we can find a suitable solution for us quickly, we're likely to<br>
>>>>> be developing such a service. It would ideally have a pluggable approval<br>
>>>>> workflow, allowing new user requests, new project requests, creation of<br>
>>>>> clients in external client database/ERP systems. Plus it would have a<br>
>>>>> password reset-token system for having new users supply their password<br>
>>>>> once they are approved, which would also allow existing users to request<br>
>>>>> password resets.<br>
>>>>><br>
>>>>> Part of our requirements are easy to integrate into Horizon, fitting<br>
>>>>> neatly into the OpenStack ecosystem along other services, and being easy<br>
>>>>> to update/alter once we have hierarchical multi-tenancy and if it makes<br>
>>>>> some things easier.<br>
>>>>><br>
>>>>> I've written up a proposal to help us define our requirements, and a<br>
>>>>> copy of that is attached, and on etherpad:<br>
>>>>> <a href="https://etherpad.openstack.org/p/User_Management_Service" target="_blank">https://etherpad.openstack.org/p/User_Management_Service</a><br>
>>>>><br>
>>>>> Plus I've attached a couple of diagrams, which are sadly not UML, but<br>
>>>>> should give you some idea of two of the primary use cases.<br>
>>>>><br>
>>>>> Is this useful to anyone? Is this entirely the wrong approach? If it is<br>
>>>>> a useful service is there any interest in collaboration?<br>
>>>>><br>
>>>>> Thanks for any feedback.<br>
>>>>><br>
>>>>> Cheers,<br>
>>>>> -Adrian Turjak<br>
>>>><br>
>>>> I have an alternative recommendation (rather than using Keystone’s API and user-management). Keystone’s user management is lacking a lot of features a full fledged IDP (identity provider) would have. “Password reset”, “password complexity”, “password reuse”, failed login locking, etc. I would recommend that you implement this service to write to a full featured IDP (LDAP, FreeIPA, Active Directory, etc) and have Keystone hook into that more-full featured IDP. You might even find that the IDP selected has a lot of these features built-in (and/or could be fronted in a horizon panel).<br>
>>>><br>
>>>> This recommendation comes from past experience implementing almost exactly this feature (and having it go through a number of incarnations). The benefits of using a full-fledged IDP outweigh the ease of using the Keystone API to manage users, especially since there is non-trivial engineering that will go into the project.<br>
>>>><br>
>>>> You could also utilize an IDP that can issue SAML assertions and go with a Federated Identity setup for Keystone. Again your tool could work with an IDP that has a better set of features that Keystone’s current build-in identity (user/group) store does.<br>
>>>><br>
>>>> Cheers,<br>
>>>> Morgan<br>
>>>><br>
>>>><br>
>>>><br>
>>>> __________________________________________________________________________<br>
>>>> OpenStack Development Mailing List (not for usage questions)<br>
>>>> Unsubscribe: <a href="http://OpenStack-dev-request@lists.openstack.org?subject:unsubscribe" target="_blank">OpenStack-dev-request@lists.openstack.org?subject:unsubscribe</a><br>
>>>> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</a><br>
>>>><br>
>>><br>
>>> __________________________________________________________________________<br>
>>> OpenStack Development Mailing List (not for usage questions)<br>
>>> Unsubscribe: <a href="http://OpenStack-dev-request@lists.openstack.org?subject:unsubscribe" target="_blank">OpenStack-dev-request@lists.openstack.org?subject:unsubscribe</a><br>
>>> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</a><br>
>>><br>
>><br>
>> __________________________________________________________________________<br>
>> OpenStack Development Mailing List (not for usage questions)<br>
>> Unsubscribe: <a href="http://OpenStack-dev-request@lists.openstack.org?subject:unsubscribe" target="_blank">OpenStack-dev-request@lists.openstack.org?subject:unsubscribe</a><br>
>> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</a><br>
>><br>
><br>
> __________________________________________________________________________<br>
> OpenStack Development Mailing List (not for usage questions)<br>
> Unsubscribe: <a href="http://OpenStack-dev-request@lists.openstack.org?subject:unsubscribe" target="_blank">OpenStack-dev-request@lists.openstack.org?subject:unsubscribe</a><br>
> <a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</a><br>
><br>
<br>
__________________________________________________________________________<br>
OpenStack Development Mailing List (not for usage questions)<br>
Unsubscribe: <a href="http://OpenStack-dev-request@lists.openstack.org?subject:unsubscribe" target="_blank">OpenStack-dev-request@lists.openstack.org?subject:unsubscribe</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</a><br>
</div></div></blockquote></div><br></div>