[Openstack] best practise to add SAML into keystone deployment and keep local auth?

Adam Young ayoung at redhat.com
Fri Nov 14 15:29:12 UTC 2014


On 11/14/2014 09:32 AM, Don Waterloo wrote:
> I have a system (juno/ubuntu 14.10) which currently has keystone as 
> the master of the
> universe for identity and authentication.
> By convention, each user of my system is also a tenant, which is my 
> intent to continue.
> My system is used by a combination of our team members, but also by 
> 3rd parties
> (e.g. we use it for training on our products).
>
> I would like to make our saml system authoritative for identity/auth 
> for the
> team members, but leave keystone authoritative for 3rd parties.
>
> Is there any documentation on someone who has such a system, or, is there
> any recommended best practises to follow?
>
>
>
>
> _______________________________________________
> Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
> Post to     : openstack at lists.openstack.org
> Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
So the intent is to split things up by domain.  I would say that your 
existing users should be in one domain (or multiple if they are 
already)  and Federated/SAML users would go into....limbo today, as 
federated users are kindof domainless.  I'd like to fix that (each IdP 
has a minimum of one domain).

The term "tenant" is kindof confusing here.  I think what you are saying 
is that each user of your system gets a default project autoprovisioned 
for them.  With Federation, you have to make sure you don't provision 
for users with Valid Federated Identities but no real relationship to 
your Cloud deployment.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack/attachments/20141114/2087eccf/attachment.html>


More information about the Openstack mailing list