Simply put, Keystone is designed to generate  tokens that are to be used for 
authentication and RBAC. Systems like Kunernetes do not support Keystone auth, 
but do support TLS. Using TLS provides a solution that is compatible with using 
these systems outside of an OpenStack cloud.

Barbican is designed for secure storage of arbitrary secrets, and currently 
also has a CA function. The reason that is compelling is that you can have 
Barbican generate, sign, and store a keypair without transmitting the private 
key over the network to the client that originates the signing request. It can 
be directly stored, and made available only to the clients that need access to 
it.

We are taking an iterative approach to TLS integration, so we can gradually 
take advantage of both keystone and Barbican features as they allow us to 
iterate toward a more secure integration.

Adrian

> On Aug 31, 2015, at 9:05 PM, Vikas Choudhary <[email protected]> 
> wrote:
> 
> Hi,
> 
> Can anybody please point me out some etherpad discussion page/spec  that can 
> help me understand why we are going to introduce barbican  for magnum when we 
> already had keystone for security management?
> 
> 
> 
> 
> -Vikas Choudhary
> 
> 
> __________________________________________________________________________
> OpenStack Development Mailing List (not for usage questions)
> Unsubscribe: [email protected]?subject:unsubscribe
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: [email protected]?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to