[Openstack] Keystone w/ LDAP identity
Adam Young
ayoung at redhat.com
Fri May 2 13:26:16 UTC 2014
So, here is the direction we are going:
Federation allows us to remove the need to have a Backend LDAP driver at
all. Instead, we at Red Hat are planning on build solutions around
using mod_identity_lookup and sssd. The Keystone server machine will be
configured with LDAP PAM and nsswitch modules that allow the basic
native library calls to work for things like getpwnam etc. The end
effect will be that there are no users "in" the Keystone backend, merely
the mappings from the environment variables REMOTE_USER and
REMOTE_USER_GROUPS to userid/username and groupid. I'm still in the
proof of concept stage with this, but should have a workable solution
midway through the Juno design cycle.
There are a couple features we need to make this a viable solution to
your problem:
1. The ability to scope the Federated mapping to the appropriate
domain. This requires a degree of "higher power" interaction so that
domain admins cannot steal eacho others data, especially userids.
2. The ability to pass groups directly through to the keystone server
from attributes. THe current implementation requires an explicit
mapping from REMOTE_USER_GROUPS to a group as defined in the Identity
backend.
Long term, I would expect to have the service users specified in
Keystone in their own domain that is explicitly in Keystone, and all
other users specified via the Federated APIs, and ephemeral to Keystone
itself.
On 05/01/2014 07:48 PM, Adam Young wrote:
> On 05/01/2014 06:17 PM, Lillie Ross-CDSR11 wrote:
>> I've been playing with using LDAP authentication (identity) and SQL
>> authorization (assignment) within Keystone in the current devstack
>> release running in a single VM.
>>
>> The problem with this setup, as I understand it, is the need to have
>> LDAP entries for each service user (i.e. nova, glance, etc.). In our
>> environment, this isn't possible as our corporate LDAP directory is
>> solely for employee records. While I could work around this issue by
>> running each service under a known LDAP employee record - this seems
>> rather a kludge to me.
>>
>> My question is, and admittedly I'm not well versed in directory
>> federation, is this an issue that could be resolved once directory
>> federation is stable in the next Openstack release? Where, for
>> instance, all of the openstack service accounts could remain in a
>> separate directory service controlled solely by the cloud
>> owner/admin, while user's could then be authenticated via the
>> corporate employee LDAP database?
>>
>> We'd love to use LDAP to authenticate cloud user's, but with the need
>> to also authenticate openstack services against the same LDAP backend
>> makes the use of LDAP unviable in our environment.
> We have no solution for that under Icehouse. This topic is one of the
> high priorities for the Keytone team at the Icehouse summit.
>
>
>>
>> This has probably been discussed previously, but any insight would be
>> helpful.
>>
>> Thanks and regards,
>> Ross
>> --
>> Ross Lillie
>> Distinguished Member of Technical Staff
>> Motorola Solutions, Inc.
>>
>> motorolasolutions.com <http://motorolasolutions.com>
>> O: +1.847.576.0012
>> M: +1.847.980.2241
>> E: ross.lillie at motorolasolutions.com
>> <mailto:ross.lillie at motorolasolutions.com>
>>
>>
>>
>>
>>
>> _______________________________________________
>> Mailing list:http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
>> Post to :openstack at lists.openstack.org
>> Unsubscribe :http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
>
>
>
> _______________________________________________
> Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
> Post to : openstack at lists.openstack.org
> Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack/attachments/20140502/1e633f1c/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/png
Size: 10441 bytes
Desc: not available
URL: <http://lists.openstack.org/pipermail/openstack/attachments/20140502/1e633f1c/attachment.png>
More information about the Openstack
mailing list