Re: [Openstack] OpenStack Identity: Keystone API Proposal

2011-06-15 Thread Rouault, Jason (Cloud Services)
Is there a plan to also have Keystone be the centralizing framework around authorization? Right now it looks like policy enforcement is left to the API layer. Thanks, Jason From: openstack-bounces+jason.rouault=hp@lists.launchpad.net

Re: [Openstack] OpenStack Identity: Keystone API Proposal

2011-06-16 Thread Rouault, Jason (Cloud Services)
See inline. Jason From: andi abes [mailto:andi.a...@gmail.com] Sent: Wednesday, June 15, 2011 5:04 PM To: Rouault, Jason (Cloud Services) Cc: Ziad Sawalha; openstack@lists.launchpad.net Subject: Re: [Openstack] OpenStack Identity: Keystone API Proposal Jason, Sounds like

Re: [Openstack] Keystone tenants vs. Nova projects

2011-07-13 Thread Rouault, Jason (Cloud Services)
If a user is bound to their default tenant, why wouldn't any role assignments for that user in their default tenant apply? Here is how I thought things were to work: - User1 has TenantA as her default tenant - User1 has been assigned RoleX for TenantA - User1 has

Re: [Openstack] Keystone tenants vs. Nova projects

2011-07-14 Thread Rouault, Jason (Cloud Services)
and group assignments within the context of TenantA. Jason From: Ziad Sawalha [mailto:ziad.sawa...@rackspace.com] Sent: Wednesday, July 13, 2011 10:35 PM To: Rouault, Jason (Cloud Services); Yuriy Taraday; openstack@lists.launchpad.net Subject: Re: [Openstack] Keystone tenants vs. Nova

Re: [Openstack] Keystone tenants vs. Nova projects

2011-07-14 Thread Rouault, Jason (Cloud Services)
Sawalha [mailto:ziad.sawa...@rackspace.com] Sent: Thursday, July 14, 2011 1:22 PM To: Rouault, Jason (Cloud Services); Yuriy Taraday; openstack@lists.launchpad.net Subject: Re: [Openstack] Keystone tenants vs. Nova projects In the example I gave below they are not members of any group and have

Re: [Openstack] Keystone tenants vs. Nova projects

2011-07-15 Thread Rouault, Jason (Cloud Services)
Sawalha; Rouault, Jason (Cloud Services) Subject: Re: [Openstack] Keystone tenants vs. Nova projects Yeah, I agree that we should not duplicate user-tenant link this way. But I cannot understand why should we have anything default. I think, everything should be explicit here. It'll make both

Re: [Openstack] OpenStack Identity: Keystone API Proposal

2011-07-21 Thread Rouault, Jason (Cloud Services)
Ziad, What is the expected behavior when requesting and using an unscoped token? Are all possible Service Endpoints returned after authentication based upon the users relationship to various tenants via roles? When the Auth Component validates the token, are all possible roles and Groups

Re: [Openstack] Nova: Admin API blueprints

2011-08-30 Thread Rouault, Jason (Cloud Services)
://blueprints.launchpad.net/nova/+spec/deferred-delete-instance From: Rouault, Jason (Cloud Services) jason.roua...@hp.com Date: Tue, 30 Aug 2011 20:56:36 + To: Vishvananda Ishaya vishvana...@gmail.com, Nguyen, Liem Manh liem_m_ngu...@hp.com Cc: openstack@lists.launchpad.net openstack

[Openstack] Keystone / Swift integration

2011-09-08 Thread Rouault, Jason (Cloud Services)
Hello, can anyone comment on the status of the Keystone auth middle-ware component for Swift? When can we expect ACL support included? Will we have swauth comparable functionality by the time Diablo releases? Thanks, Jason smime.p7s Description: S/MIME cryptographic signature

Re: [Openstack] [Swift] [Keystone] Account migration

2011-09-13 Thread Rouault, Jason (Cloud Services)
If there is an existing swift customer with swift account 'foo' and nova project 'bar', there is no way to have them belong to the same Keystone tenant. I think that is the data migration issue. Jason -Original Message- From: openstack-bounces+jason.rouault=hp@lists.launchpad.net

Re: [Openstack] Keystone Swift: swiftauth tenant namespace collisions?

2011-11-20 Thread Rouault, Jason (Cloud Services)
Ziad, I think the problem is that the 'swift' command scopes a user to an account(tenant) via the concatenation of account:username when providing credentials for a valid token. With Keystone and /v2.0 auth the tenantId (or tenantName) are passed in the body of the request. Jason

Re: [Openstack] Keystone Use Cases and User Stores

2012-02-17 Thread Rouault, Jason (Cloud Services)
http://etherpad.openstack.org/keystone-domains -Original Message- From: openstack-bounces+jason.rouault=hp@lists.launchpad.net [mailto:openstack-bounces+jason.rouault=hp@lists.launchpad.net] On Behalf Of Joseph Heck Sent: Friday, February 17, 2012 12:59 PM To: OpenStack Mailing

Re: [Openstack] Keystone Use Cases and User Stores

2012-02-17 Thread Rouault, Jason (Cloud Services)
on the 28th but Guang can attend. Jason -Original Message- From: Joseph Heck [mailto:he...@mac.com] Sent: Friday, February 17, 2012 1:45 PM To: Rouault, Jason (Cloud Services) Cc: OpenStack Mailing List Subject: Re: [Openstack] Keystone Use Cases and User Stores Thanks Jason - Thats already

Re: [Openstack] How many Role name can be used in Keystone and what is the use of each role?

2012-03-16 Thread Rouault, Jason (Cloud Services)
Keystone does not have the concept of least privilege for such operations. The notion of roles with capabilities in Keystone is something that maybe can be addressed in Folsom Jason From: openstack-bounces+jason.rouault=hp@lists.launchpad.net

Re: [Openstack] [Swift][Keystone] Swift Quotas

2012-05-04 Thread Rouault, Jason (Cloud Services)
IMHO, if it is a quota related to a tenant or user, then managing it in Keystone makes sense. Jason -Original Message- From: openstack-bounces+jason.rouault=hp@lists.launchpad.net [mailto:openstack-bounces+jason.rouault=hp@lists.launchpad.net] On Behalf Of Eoghan Glynn Sent:

Re: [Openstack] Swift: tempURL

2012-05-15 Thread Rouault, Jason (Cloud Services)
There is a blueprint for this work in Keystone Folsom From: openstack-bounces+jason.rouault=hp@lists.launchpad.net [mailto:openstack-bounces+jason.rouault=hp@lists.launchpad.net] On Behalf Of Suchi Sinha (susinha) Sent: Monday, May 14, 2012 11:29 AM To: openstack@lists.launchpad.net

Re: [Openstack] Identity API v3 - Why allow multi-tenant users?

2012-07-17 Thread Rouault, Jason (Cloud Services)
One benefit is the user does not need to have multiple sets of credentials to interact with multiple projects. Jason From: openstack-bounces+jason.rouault=hp@lists.launchpad.net [mailto:openstack-bounces+jason.rouault=hp@lists.launchpad.net] On Behalf Of Adam Young Sent: Tuesday,

Re: [Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-02 Thread Rouault, Jason (Cloud Services)
This was a concern for HP as well. This is one of the reasons we were happy to see that signed tokens are currently a deployment option. So, you can continue to use the unsigned model until such a time that revocation can be put into place for the token signing model. Jason From: