Steve,
You've done amazing job. Thanks for that and making keystone even better!
Marek Denis
__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org
can only hope my contributions and reviews
have been useful and made OpenStack a little bit better.
I wish you all the best in the future.
With kind regards,
Marek Denis
__
OpenStack Development Mailing List (not for usage
___
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
--
Marek Denis
[marek.de...@cern.ch]
___
om/zaccone/3c3d4c8f39a19709bcd7/raw/d938f2f9d1cf06d29a81d57c8069c291fed66cab/k2k-env.sh
https://gist.githubusercontent.com/zaccone/4bbc07d215c0047738b4/raw/75295fe32df88b24576ece69994270dc4eb19a6e/k2k-ecp-client.py
my keystone version is kilo
help me, thanks
I hope I did! :-)
--
M
Hi
On 05.08.2015 19:36, Dolph Mathews wrote:
yes this was my understanding of the discussion that took place many
months ago. I had assumed (wrongly) that something had been done about
it, but I guess from your message that we are no further forward on this
Actually 2) above
I am +1 on this SFE.
Dynamic Policy team has been working hard on this and they will for sure
deliver nice features for Liberty.
-- Marek Denis [marek.de...@cern.ch]
__
OpenStack Development Mailing List (not for usage
: https://review.openstack.org/#/c/166078/and 2) to
actually use this new property in order to generate the ECP assertion:
https://review.openstack.org/#/c/162866/
Thanks,
Steve Martinelli
OpenStack Keystone Core
Marek Denis
OpenStack Keystone Core
,
--
Marek Denis
Keystone Core member
__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo
Akshik,
When you are beginning an adventure with saml, shibboleth and so on,
it's helpful to start with fetching auto-generated shibboleth2.xml file
from testshib.org . This should cover most of your use-cases, at least
in the testing environment.
Marek
Provider)
Let me know if that was your issue.
If not, a more detailed steps of how your configured your Keystone
acting as a Service Provider would be more helpful.
Marek Denis
On 27.02.2015 11:26, Akshik DBK wrote:
Hi I'm new to SAML, trying to integrate keystone with SAML, Im using
Ubuntu
Hi Akshik,
Could you give some more details about the steps you did for configuring
federation as well as the environment you are using?
Is it devstack? What version of Keystone do you use?
Thanks,
Marek
On 19.02.2015 12:52, Akshik DBK wrote:
im getting “Target WSGI script
+1 from me.
On 13.02.2015 22:19, Morgan Fainberg wrote:
On February 13, 2015 at 11:51:10 AM, Lance Bragstad
(lbrags...@gmail.com mailto:lbrags...@gmail.com) wrote:
Hello all,
I'm proposing the Authenticated Encryption (AE) Token specification
[1] as an SPFE. AE tokens increases scalability
Fainberg
(morgan.fainb...@gmail.com) wrote:
Hi everyone!
I wanted to propose Marek Denis (marekd on IRC) as a new member of the
Keystone Core team. Marek has been instrumental in the implementation
of Federated Identity. His work on Keystone and first hand knowledge of
the issues with extremely
Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
--
Marek Denis
[marek.de...@cern.ch
...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
--
Marek Denis
[marek.de...@cern.ch]
__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe
to the Keystone Spec
repo. Voting will remain open until Friday Jan 23.
Cheers,
Morgan Fainberg
--
Marek Denis
[marek.de...@cern.ch]
__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack
Hi John,
It indeed looks interesting and enhancing the mapping engine is on ours
to-do list for a long time. I'd be happy to talk this through during the
summit. Do you think you will be able to come for a Keystone
websso/federation Design Session on Wednesday at 16.30?
Thanks,
Marek
On
On 17.09.2014 15:45, Steve Martinelli wrote:
++ to your suggestion David, I think making the list of trusted IdPs
publicly available makes sense.
I think this might be useful in an academic/science world but on the
other hand most cloud providers from the 'business' world might be very
Hi,
First of all, we should clarify whether your JS client wants to
implement ECP or WebSSO workflow. They are slightly different.
I feel JS is smart enough to implement the ECP flow and then and it
could simply implement what we already have in the keystoneclient [0].
This + some discovery
php-script which prints out all the
variables:
?php
header('Content-Type: text/plain');
foreach($_SERVER as $key=$value) {
if(substr($key, 0, 7) == 'MELLON_') {
echo($key . '=' . $value . \r\n);
}
}
?
--
Marek Denis
[marek.de...@cern.ch
extensions or
you used only webSSO?
--
Marek Denis
[marek.de...@cern.ch]
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
, but from what I have already noticed
after the client is redirected to the IdP (and to the SP again) the
initial input is lost.
I am looking forward to hear feedback from you.
Thanks,
--
Marek Denis
[marek.de...@cern.ch]
___
OpenStack-dev mailing list
for the reply.
--
Marek Denis
[marek.de...@cern.ch]
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
23 matches
Mail list logo