Bug 1041881 - [RFE][keystone]: Design for allowing IdP Administrators to update Attribute Mappings
Summary: [RFE][keystone]: Design for allowing IdP Administrators to update Attribute M...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat OpenStack
Classification: Red Hat
Component: openstack-keystone
Version: unspecified
Hardware: Unspecified
OS: Unspecified
high
medium
Target Milestone: z2
: 6.0 (Juno)
Assignee: RHOS Maint
QA Contact: Mike Abrams
URL: https://blueprints.launchpad.net/keys...
Whiteboard: upstream_milestone_icehouse-3 upstrea...
Depends On: 1053722 1105109
Blocks: 1082414
TreeView+ depends on / blocked
 
Reported: 2013-12-12 19:51 UTC by RHOS Integration
Modified: 2016-04-26 23:32 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Enhancement
Doc Text:
Clone Of:
: 1082414 (view as bug list)
Environment:
Last Closed: 2015-03-09 14:51:48 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description RHOS Integration 2013-12-12 19:51:59 UTC
Cloned from launchpad blueprint https://blueprints.launchpad.net/keystone/+spec/mapping-distributed-admin.

Description:

We describe how external administrators (of federation IdPs or cloud using organisations) are recognised as being trusted to specify the organisational attributes that their users will present, the credential validation rules for these, and hence the user organisational attribute assignments that Keystone will accept. Furthermore they are also trusted to perform attribute mappings from these organisational attributes to a subset of the OpenStack attributes that will give the users permission to access the various OpenStack services. We also specify higher level API operations for managing attribute mappings

When Apache or another Web Container processes the Authentication, the environment variables passed through, such as REMOTE_USER, will not always map exactly to the attributes as exposed by the Identity API.  For example, If Kerberos is used, the  the REMOTE_USER field will come through with Principal@REALM, but the principal may contain characters other than the UserID, and the REALM will probably look like a FQDN but in all caps.  

IN addition,  Groups will come through in a variety of formats.    SSL_  or NSS_ prefeixed variables from the parsing of X509 will sometimes have values that should map to groups in them.  Other variables will be lists or maps that need to be expanded first.

The mapping is likely to be different based on the Identity Provider and Protocol combination.  As such, dynamicallyt adding a new IdP  or adding a new protocol to an IdP will require either the reuse of an existing mapping, or the generation of a new mapping.

Specification URL (additional information):

https://docs.google.com/document/d/1q7BXxFxhPO0d8ZsaRbex9MFtO_jPN-qxIV_7YaKzWLk/edit

Comment 2 Udi Kalifon 2014-04-07 15:03:08 UTC
The blueprint for this feature seems to be irelevant. 
The feature will be tested according to: https://github.com/openstack/identity-api/blob/master/openstack-identity-api/v3/src/markdown/identity-api-v3-os-federation-ext.md

Adam, please confirm. Thanks.

Comment 3 Nathan Kinder 2014-04-08 15:08:56 UTC
(In reply to Udi from comment #2)
> The blueprint for this feature seems to be irelevant. 
> The feature will be tested according to:
> https://github.com/openstack/identity-api/blob/master/openstack-identity-api/
> v3/src/markdown/identity-api-v3-os-federation-ext.md
> 
> Adam, please confirm. Thanks.

Yes, the OS-FEDERATION API covers this.  You should be able to work off of the API doc and ignore the blueprint.

Comment 4 Udi Kalifon 2014-06-05 08:45:48 UTC
To test this bug, I need to install shibboleth and mod_shib. Noone ever built packages for these in either RHEL or Fedora. Please arrange for the RPMs to be available with yum install.

Comment 6 Arthur Berezin 2014-06-11 13:30:49 UTC
Given that ipsilon/mod_mellon is expected to be included in RHEL 7.1, pushing this RFF for OSP6.

Comment 8 Udi Kalifon 2014-11-20 13:29:39 UTC
We have a test plan for this, and we tested all we wanted in this feature and all passed.

Comment 9 Arthur Berezin 2014-12-02 14:15:05 UTC
This will be usable starting with RHEL7.1 which includes ipsilon/mod_mellon.

Comment 10 Udi Kalifon 2014-12-02 15:45:53 UTC
This bug was not tested, and will not be testable until RHEL 7.1 because we don't ship the needed dependencies with RHEL 7 (we need mod_mellon to test the federation feature in keystone). 

Please ignore my comment #8 and ignore the "Tested" keyword in the QE Whiteboard. I meant to put these in another bug and by mistake I put them in this bug. Sorry.


Note You need to log in before you can comment on or make changes to this bug.