So, here is the direction we are going:

Federation allows us to remove the need to have a Backend LDAP driver at all. Instead, we at Red Hat are planning on build solutions around using mod_identity_lookup and sssd. The Keystone server machine will be configured with LDAP PAM and nsswitch modules that allow the basic native library calls to work for things like getpwnam etc. The end effect will be that there are no users "in" the Keystone backend, merely the mappings from the environment variables REMOTE_USER and REMOTE_USER_GROUPS to userid/username and groupid. I'm still in the proof of concept stage with this, but should have a workable solution midway through the Juno design cycle.

There are a couple features we need to make this a viable solution to your problem:

1. The ability to scope the Federated mapping to the appropriate domain. This requires a degree of "higher power" interaction so that domain admins cannot steal eacho others data, especially userids.

2. The ability to pass groups directly through to the keystone server from attributes. THe current implementation requires an explicit mapping from REMOTE_USER_GROUPS to a group as defined in the Identity backend.

Long term, I would expect to have the service users specified in Keystone in their own domain that is explicitly in Keystone, and all other users specified via the Federated APIs, and ephemeral to Keystone itself.






On 05/01/2014 07:48 PM, Adam Young wrote:
On 05/01/2014 06:17 PM, Lillie Ross-CDSR11 wrote:
I've been playing with using LDAP authentication (identity) and SQL authorization (assignment) within Keystone in the current devstack release running in a single VM.

The problem with this setup, as I understand it, is the need to have LDAP entries for each service user (i.e. nova, glance, etc.). In our environment, this isn't possible as our corporate LDAP directory is solely for employee records. While I could work around this issue by running each service under a known LDAP employee record - this seems rather a kludge to me.

My question is, and admittedly I'm not well versed in directory federation, is this an issue that could be resolved once directory federation is stable in the next Openstack release? Where, for instance, all of the openstack service accounts could remain in a separate directory service controlled solely by the cloud owner/admin, while user's could then be authenticated via the corporate employee LDAP database?

We'd love to use LDAP to authenticate cloud user's, but with the need to also authenticate openstack services against the same LDAP backend makes the use of LDAP unviable in our environment.
We have no solution for that under Icehouse. This topic is one of the high priorities for the Keytone team at the Icehouse summit.



This has probably been discussed previously, but any insight would be helpful.

Thanks and regards,
Ross
--
Ross Lillie
Distinguished Member of Technical Staff
Motorola Solutions, Inc.

motorolasolutions.com <http://motorolasolutions.com>
O: +1.847.576.0012
M: +1.847.980.2241
E: ross.lil...@motorolasolutions.com <mailto:ross.lil...@motorolasolutions.com>





_______________________________________________
Mailing list:http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to     :openstack@lists.openstack.org
Unsubscribe :http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack



_______________________________________________
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to     : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack

_______________________________________________
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to     : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack

Reply via email to