Bug 1487459
| Summary: | [RFE] cannot use trusts with federated users in keystone | ||
|---|---|---|---|
| Product: | Red Hat OpenStack | Reporter: | August Simonelli <asimonel> |
| Component: | openstack-keystone | Assignee: | Dave Wilde <dwilde> |
| Status: | CLOSED DUPLICATE | QA Contact: | Jeremy Agee <jagee> |
| Severity: | high | Docs Contact: | |
| Priority: | medium | ||
| Version: | 13.0 (Queens) | CC: | dhill, dwilde, hrybacki, jbiao, lbragsta, mnadeem, nkinder, pablo.iranzo, sclewis, sputhenp, srelf, srevivo, therve |
| Target Milestone: | --- | Keywords: | FutureFeature, Reopened |
| Target Release: | --- | Flags: | ifrangs:
needinfo?
(dwilde) |
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-03-17 18:03:36 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
August Simonelli
2017-09-01 00:43:20 UTC
Affects heat, as seen here: https://bugzilla.redhat.com/show_bug.cgi?id=1480067 Also see: https://review.openstack.org/#/c/415895/ In my testing, if you use a mapping for your federated users, it will work for trusts and Heat. The change (https://blueprints.launchpad.net/keystone/+spec/shadow-mapping) landed in Ocata and is in OSP11. *** Bug 1480067 has been marked as a duplicate of this bug. *** Per Cu. comment, this RFE is no longer requested. Closing as WONTFIX -- please re-open if the RFE is re-requested. Got another customer hitting this issue again so I'm re-opening. This is for RHOSP13 and not RHOSP10. The current shadow user doesn't scale well with this:
~~~
[ {
"local": [
{
"user": {
"name": "{0}",
"email": "{0}"
},
"groups": "{1}",
"domain": {
"id" : "default"
}
}
],
"remote": [
{
"type": "OIDC-email"
},
{
"type": "OIDC-groups"
}
]
}]
~~~
Where would you add "_member_" roles to the existing groups created by various customer using this federated platform ?
Hi, commeneting so i get updates. Please feel free to reachout if you need additional info. Just to expand on the above comments. We use Key cloak, and don't want to have to manage a mapping file which would grow to be massive and unusable, as we are a public cloud. *** This bug has been marked as a duplicate of bug 1590932 *** |