On 05/21/2014 10:48 AM, Michael Hearn wrote:
Keystone gurus,
Can you help put me straight on expected Authentication behaviour when using an LDAP identity backend. In the scenario where a user is granted a token (keystone token-get) should they not be able to make repeated API calls, e.g /glance --os-auth-token xxxxxxx image-list / until the token expires?

I ask as using /tcpdump/ I am seeing AuthN traffic between keystone and LDAP each time I execute an API call - a call that includes an unexpired token. I was assuming that by using an unexpired token a user avoids having to make an AuthN call. Is that not the case?

The glance CLI does not cache the token. There was code in the Keystone client to cache the token in python-keyring. If glance is not honoring the --os-auth-token value then it might be going back to keystone.

However, if the token is a UUID token, then here is what happens: user goes to Keystone, gets a token (uuid) , and passes that to glance. Glance passes that back to Keystone and says "is this valid" and keystone responds "yep, and here is the service catalog." Glance now has the option of caching this response in memcached. If it does not, it needs to go back to Keystone every time.


But...now I see below that you are using pki and memcached. Which means something is not behaving. If glance honors the --debug flag, you can see if the CLI is going to Keystone, or if it is the server.

Curious.


Cheers
Mike.

Am using icehouse with token format set to PKI , caching enabled (memcached )


_______________________________________________
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to     : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack

_______________________________________________
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to     : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack

Reply via email to