One of the most impactful decisions you’ll have to make when configuring keystone is deciding how you want keystone to source your identity data. Keystone supports several different choices that will substantially impact how you’ll configure, deploy, and interact with keystone.
You can also mix-and-match various sources of identity (see Domain-specific Configuration for an example). For example, you can store OpenStack service users and their passwords in SQL, manage customers in LDAP, and authenticate employees via SAML federation.
Feature | Status | REMOTE_USER | LDAP | OAuth v1.0a | OpenID Connect | SAML v2 | SQL |
---|---|---|---|---|---|---|---|
Local authentication | optional | ✖ |
✔ |
✔ |
✖ |
✖ |
✔ |
External authentication | optional | ✔ |
✖ |
✖ |
✔ |
✔ |
✖ |
Identity management | optional | ✖ |
✔ |
✔ |
✖ |
✖ |
✔ |
PCI-DSS controls | optional | ✔ |
✔ |
✖ |
✖ |
✖ |
✔ |
Auditing | optional | ✖ |
✔ |
✖ |
✔ |
✔ |
✔ |
Status: optional. Authenticate with keystone by providing credentials directly to keystone.
drivers:
complete
complete
complete
missing
missing
missing
Status: optional. Authenticate with keystone by providing credentials to an external system that keystone trusts (as with federation).
drivers:
missing
missing
missing
complete
complete
complete
Status: optional. Create, update, enable/disable, and delete users via Keystone’s HTTP API.
drivers:
complete
partial
complete
missing
missing
missing
Status: optional. Configure keystone to enforce PCI-DSS compliant security controls.
drivers:
complete
partial
missing
partial
missing
missing
Status: optional. Audit authentication flows using PyCADF.
drivers:
complete
complete
missing
missing
complete
complete
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.