[openstack-dev] [Keystone] Adding support for groups of users

Alexandra Shulman-Peleg SHULMANA at il.ibm.com
Tue Nov 20 18:22:50 UTC 2012


Hi, 

To my opinion these are two complementary solutions which can coexist. 
Even though federation may be used to group the internal users as well, it 
is useful to have a simple definition of users and groups as it is done in 
most common file systems. These definitions may allow using alternative 
pluggable authorization methodologies without any dependency on the RBAC 
of Keystone or any external IAM. Thus, I would like to vote in favor of 
starting with the simple group model proposed by Henry. The federation 
model may be later enhanced as well providing a comprehensive solution for 
the integration with external IAMs. 

Best Regards,
Alex. 

----------------------------------------------------------
Alexandra Shulman-Peleg, PhD
Storage Research, Cloud Platforms Dept.
IBM Haifa Research Lab
Tel: +972-3-7689530 | Fax: +972-3-7689545



From:   Henry Nash <henryn at linux.vnet.ibm.com>
To:     OpenStack Development Mailing List 
<openstack-dev at lists.openstack.org>, 
Date:   20/11/2012 02:27 PM
Subject:        Re: [openstack-dev] [Keystone] Adding support for groups 
of users



So to try and take the discussion further, I think, we are really down to 
2 options - either implement the current "user groups" proposal 
more-or-less as is or re-structure this to look more like what role 
mapping will be in any federation implementation.  Here's a brief 
comparison/analysis

- In general, a cloud service will define the various roles that it 
supports in its own native terminology.  In openstack today this is done 
within the policy.json files of each service.  Note that it is the service 
that defines the roles and how granular they are (e.g. you COULD define a 
role for calling each api, or you could cluster this together into some 
smaller subset of roles, as most services tend to - it's up to the 
service/endpoint).
- This gives us clear problems in two user scenarios
a) A cloud provider runs an openstack installation to host a cloud that 
has many large enterprises as customers.  For large customers with many 
users & projects it will often become impractical to assign each user 
specific roles on projects.  Rather they will want a away of "grouping" 
users together and assigning the role to that group of users to a project. 
 Note that grouping will be customer specific and cannot be defined by the 
cloud provider (since they don't know what groups make sense for any given 
customer, nor do they want to). For a more detailed example, see the 
blueprint: https://blueprints.launchpad.net/keystone/+spec/user-groups. 
b) For a user that visits many different clouds, how is it that the cloud 
providers can co-operate so that they agree on some standards for roles 
and authentication so that the user does not have to create all these 
separately with each cloud provider?  This is the core of the federation 
proposal - how the to enable cloud providers, customers, users and 3rd 
parties to agree on who will confirm identity and map roles that make 
sense to the customer and/or external standards into specific roles that 
the various service providers have defined.

The two proposal have grown up in an attempt to find solutions to a) and 
b).  The question is whether it is more appropriate to:

1) Extend the federation model to (effectively) include mapping between 
the customers-specifc roles created in a domain and the roles various 
cloud services within a non-federated openstack, or
2) Implemented a more specific, and more common, solution ("groups of 
users") for intra-openstack mapping and keep the federation mapping for 
its original design to engage across 3rd parties and multiple clouds 
(inter-openstack)

The added complication, is that we ideally want something we can do within 
Grizzly, i.e. that does not involve significant changes to the already 
implemented v3 Keystone APIs.  The full federation implementation is a 
Medium term goal, so if we took that option, we would need to implement 
the intra-openstack bit first, ahead of the full work. 

My personal preference, putting my cards on the table, is to go for the 
simpler, groups-of-users approach - since it is a common solution to this 
issue (in use by other products today), is a relatively simple extension 
to the current v3 API - and allows federation to concentrate on what it is 
designed to do.  Of course, as we know, you can adapt s/w to do (almost) 
anything, but this, to me, seems the best course.

Again, interested in other people's views.

Henry
On 17 Nov 2012, at 21:28, Henry Nash wrote:

> Hi
> 
> Expanding a discussion regarding: 
https://blueprints.launchpad.net/keystone/+spec/user-groups
> 
> Thanks to Guang Yee and David Chadwick for their detailed comments.  I 
think right now there
> are no outstanding questions in terms of the actual proposal in of
> itself - other than the interesting point of view from David that in
> fact you could achieve the same affect by using the role mapping
> concept from the federation proposal.  I'll try and summarize David's
> point:
> 
> "For federation, in order to be able to effectively use/chose from
> many external Identity Providers and Attribute Authorities, there
> must be mapping between the attributes/roles that the cloud service
> itself understands and those defined by those external authorities.
> [This is proposed to be a function of the Openstack Gateway in the
> current federation proposal].  One could therefore imagine extending
> this to where this could also be used to map the customer defined
> roles (e.g. Teacher, Pupil) to roles that were exposed by the Gateway
> for the cloud service required."
> 
> So I think we need to discuss how best to move forward.  In my mind
> there are a few options:
> 
> 1) Just bundle this requirement up with federation.
> 
> 2) Implement a role mapping capability that is broadly api compatible
> with what we will do with federation.  In this we would take the
> first steps at re-deinfing the terminology (i.e. what's a cloud
> service attribute and what's a locally-defined role), provide a
> mapping capability, start to evolve the appropriate Ui etc.
> 
> 3) Just implement the groups concept as defined.  In the long run
> maybe this is replaced (or made redundant) by role mapping, but only
> if we chose to drive the federation mapping into non-federated
> configurations of openstack.
> 
> My concerns are: a) Federation is a really important capability we
> need and will get delivered in the future.  Given its scope, however,
> pretty sure this is not a Grizzly item - and maybe even longer? b) We
> will always have this balancing act of what features we put in a
> "self-contained" (i.e. non-federated) openstack implementation - and
> I feel the basic assignment (using today's keystone terms) of roles
> to groups of users is imperative for large enterprise use (it is
> certainly what we have found in other products)
> 
> However, I'd been keen to this group's view of these options.  I do
> believe that grouping or mapping is an important capability we need
> to add - and really want to find a way of getting this into Grizzly
> in some shape or form.
> 
> David's comments to the above:
> 
> Hi Henry
> 
> Thanks for your summary, which is fine.
> 
> Given that federation will be implemented in the medium term, there is 
nothing to stop components of it being implemented now. For example, 
Kristy has just shown me how the directory function needed for federation 
can be implemented using an enhanced services catalog with the existing 
interface, and she will distribute the design for this on Monday for you 
guys to comment upon.
> 
> I would therefore support implementing the mapping function now to 
support current use cases (option 2 below) then it can subsequently be 
used by federation when the latter is integrated. I dont think the API for 
attribute/role mapping will be that difficult to define. The tricky thing 
is to get the access controls right, so that each organisational 
administrator is only allowed to map his organisational roles/attributes 
into the cloud service roles that the cloud administrator has granted him 
access to (we call this the administrative scope of the organisational 
administrator). For example, there may be an admin role defined for a 
cloud service, which has super-user privileges that the cloud 
administrator uses, but he does not want the organisational administrators 
to have access to this. So when they perform role mapping they would not 
be allowed to map their staff or programmer role, say, into the admin 
role.
> 
> The first step could be to have a design blueprint for mapping that we 
all contribute to. If you are happy to proceed on this basis, maybe Henry, 
or Kristy and myself, can start on this next week
> 
> regards
> 
> David
> 
> 
> 
> 
> 


_______________________________________________
OpenStack-dev mailing list
OpenStack-dev at lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack-dev/attachments/20121120/0510c283/attachment.html>


More information about the OpenStack-dev mailing list