On 04/17/2014 07:17 AM, Roman Bodnarchuk wrote:
Hello,

Right now I am trying to set-up a self-signup for users of our OpenStack cloud. One of the essential points of this signup is verification of user's email address - until a user proves that this address belongs to him/her, he/she should not be able to do anything useful in the cloud.

In the same time, a partial access to the cloud is very desirable - at minimum, a user should be able to authenticate to Keystone and successfully obtain a token, but should not be able to change anything in other services or access information of other users.

It is possible to disable a user with corresponding field in User model, but this will not let us to use Keystone as a source of authentication data (Keystone returns 401 for request to /auth/token with credentials of disabled user).

Other way to do this would be to created a special role like `unconfirmed` for a default project/domain, and assign it to users with unconfirmed email (this will be the only role assigned for them). Thus, it will be possible to authenticate them, but they won't able to use the system.
I think this is the right approach.

So, the question - does this approach make sense? Are there any dangerous resources in OpenStack, which user with auth token and some "unknown" role can access?

Yes, depending on the policy file. But it should only be restricted to a specific project/tenant.

You could further develop the policy file such that "unconfirmed" can do a limited set of actions, but what would those actions be?


Any comments about other possible solutions are also welcomed.

Thanks,
Roman

_______________________________________________
OpenStack-dev mailing list
[email protected]
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


_______________________________________________
OpenStack-dev mailing list
[email protected]
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to