The approach here looks solid, but I'm not sure if it goes far enough.

One issue that Keystone has to resolve eventually is how to authenticate 
request for tenant-specific file system users.
Basically the core authentication system allows satellite authentication 
systems to authenticate users within defined scopes.
That is a Tenant X authentication server authenticates file system users for 
Tenant X. TenantX:Jsmith is a different user than
TenantY:Jsmith.

What you probably want to avoid for that sort of system is *mapping* all of 
users from each of the Tenants to the central
authentication server. Adding and deleting file system users from *all* tenants 
could end up being a bit too many transactions
and ultimately requires excessive and error-prone replication of data.

What we need is for TenantX's server to provide the information about who 
"Jsmith" is, and what jsmith is allowed to do,
But in a way where it cannot reference any of TenantY's resources.


_______________________________________________
Mailing list: https://launchpad.net/~openstack
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~openstack
More help   : https://help.launchpad.net/ListHelp

Reply via email to