[keystone] scope enforcement ready for prime time?
Nikolla, Kristi
knikolla at bu.edu
Wed May 6 23:19:32 UTC 2020
Hi Mark,
If the API in that OpenStack service doesn't have support for system/domain scopes and only checks for the admin role, the user would have cloud admin on that specific OpenStack API.
Until all the services that you have deployed in your cloud properly support scopes, admin role on anything still gives cloud admin.
Best,
Kristi
> On May 6, 2020, at 5:17 PM, Mark Goddard <mark at stackhpc.com> wrote:
>
> Hi,
>
> I have a use case which I think could be fulfilled by scoped tokens:
>
> Allow an operator to delegate the ability to an actor to create users within a domain, without giving them the keys to the cloud.
>
> To do this, I understand I can assign a user the admin role for a domain. It seems that for this to work, I need to set [oslo_policy] enforce_scope = True in keystone.conf.
>
> The Train cycle highlights suggest this is now fully implemented in keystone, but other most projects lack support for scopes. Does this mean that in the above case, the user would have full cloud admin privileges in other services that lack support for scopes? i.e. while I expect it's safe to enable scope enforcement in keystone, is it "safe" to use it?
>
> Cheers,
> Mark
More information about the openstack-discuss
mailing list