Hi Piotr,

 

That is likely due to the enforce_scope configuration option being set as False by default [0]

 

We’re not to a point yet where you can safely give someone the admin role on any project. [1][2]

 

Kristi

 

[0]. https://docs.openstack.org/oslo.policy/latest/configuration/index.html#oslo-policy

[1]. https://governance.openstack.org/tc/goals/proposed/consistent-and-secure-rbac.html

[2]. https://review.opendev.org/c/openstack/governance/+/815158

 

 

 

From: Piotr Misiak <piotrmisiak1984@gmail.com>
Date: Wednesday, November 24, 2021 at 05:04
To: openstack-discuss@lists.openstack.org <openstack-discuss@lists.openstack.org>
Subject: [keystone][policy][ussuri] why I can create a domain

Hi,

Maybe a stupid question but I'm really confused.

In my Ussuri cloud Keystone has a following policy for create_domain
action (this is a default policy from Keystone code):

"identity:create_domain": "role:admin and system_scope:all"


I have a user which has "admin" role assigned in project "admin" in
domain "default" - AKA cloud admin.

The user does not have any roles assigned on system scope.


Could someone please explain why this user is able to create a domain in
the cloud?

Looking at the policy rule he shouldn't or maybe I'm reading it in a
wrong way?


Is there any "backward compatibility" casting "cloud admin" role to
"system_scope:all"?


Please help

Thanks

Piotr