[Openstack-operators] Restricting API access as "admin" users based on network

Adam Young ayoung at redhat.com
Tue Oct 21 14:23:40 UTC 2014


On 10/20/2014 12:11 AM, Tim Goddard wrote:
> Hello all,
>
> We have an established OpenStack cloud and as part of a round of security
> hardening would like to add some additional restrictions on the use of "admin"
> permissions.
>
> In particular, we would like to limit it so that API endpoints requiring admin
> access can only be used from a VPN (known range of source IP addresses). We do
> not want the public-facing APIs to expose these endpoints, even to users with
> the right credentials.
>
> Has anyone already been through a similar process and have a method or advice
> for us to follow?
 From a Keystone perspective, what you want to do is to user the "admin" 
and "main
  configuration to have each mapped to different interfaces on the HTTPD 
server machine don't try to do this with Eventlet, as Eventlet alone 
doesn't support it.

You'll have to decide what you want to do about Horizon, as the Admin 
operations on Keystone from Horizon are RBAC controlled.  You could run 
two different Horizon instances, one internal and one external, and give 
each a seaprate Auth URL.  Then the Admin port would be hidden from 
Horizon, but I think the admin fields wouls still show up on the Horizon 
portal, just be non-functional.  I'll let some Horizon folks chime in 
with how to deal with that.

Unfortunately, each service defines these things a little differntly, 
and not all fo them run in Eventlet. For the ones that run in Eventlet, 
you'll need to use some form of termination in front of them to bind to 
different interfaces.



>
> Cheers,
>
> Tim
>
> _______________________________________________
> OpenStack-operators mailing list
> OpenStack-operators at lists.openstack.org
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators




More information about the OpenStack-operators mailing list