Book description
Keystone—OpenStack's Identity service—provides secure controlled access to a cloud’s resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.
Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layer—as well as key practices for safeguarding your cloud's ongoing security.
Publisher resources
Table of contents
- Preface
- Introduction
- 1. Fundamental Keystone Topics
-
2. Let’s Use Keystone!
- 2.1 Getting DevStack
-
2.2 Basic Keystone Operations Using OpenStackClient
- 2.2.1 Getting a Token
- 2.2.2 Listing Users
- 2.2.3 Listing Projects
- 2.2.4 Listing Groups
- 2.2.5 Listing Roles
- 2.2.6 Listing Domains
- 2.2.7 Creating Another Domain
- 2.2.8 Create a Project within the Domain
- 2.2.9 Create a User within the Domain
- 2.2.10 Assigning a Role to a User for a Project
- 2.2.11 Authenticating as the New User
- 2.3 Basic Keystone Operations Using Horizon
- 2.4 Tips, Common Pitfalls, and Troubleshooting
- 3. Token Formats
-
4. LDAP
- 4.1 Approach to LDAP Integration
- 4.2 Configuring Keystone to Integrate with LDAP
-
4.3 Multiple Domains and LDAP
- 4.3.1 Requirements for Multi-Domain Corporate Directory Support
- 4.3.2 Setting Up Multi-Domain Using the Configuration File–Based Approach
- 4.3.3 Setting Up Multi-Domain Using the Keystone API–Based Approach
- 4.3.4 Restrictions When Using Multi-Domain Identity
- Use SQL for the Default Domain
- Use LDAP for All Domains, Except an SQL Service Domain
- Use LDAP for All Domains
- 4.4 A Practical Guide to Using Multi-Domains and Keystone
- 4.5 Projects, Roles, and Assignments from LDAP (Just Say NO!)
- 4.6 Tips, Common Pitfalls, and Troubleshooting
-
5. Federated Identity
- 5.1 Approach to Federation
- 5.2 Translating User Attributes to Keystone Concepts
- 5.3 Authentication Flow: What’s It Look Like?
- 5.4 Single Sign-On
- 5.5 A Practical Guide to Federating Identities for IBM WebSphere Liberty and Bluepages
- 5.6 A Practical Guide to Setting Up SSO with Google
- 5.7 Tips, Common Pitfalls, and Troubleshooting
-
6. Future Work
- 6.1 Multi-Factor Authentication
- 6.2 Integration with Horizon for Multi-Region Keystone to Keystone Federation Support
- 6.3 Using LDAP as a Federated Identity Provider
- 6.4 Replacement of Service Users with X.509 Certificates and Barbican Integration
- 6.5 Centralized Policy and Distribution
- 6.6 Integrating with Other Technologies
- Index
Product information
- Title: Identity, Authentication, and Access Management in OpenStack
- Author(s):
- Release date: December 2015
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781491941201
You might also like
book
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Leverage existing free open source software to build an identity and access management (IAM) platform that …
book
Access Control, Authentication, and Public Key Infrastructure
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control …
book
Access Control, Authentication, and Public Key Infrastructure, 2nd Edition
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series meets all …
book
Certified OpenStack Administrator Study Guide
Teaches you how and what to study in order to be best prepared for the Certified …