3.2 KiB
OpenID Connect federation
As of the Icehouse release, the only federation protocol that is supported is SAML, the purpose of this specification is to enable support for OpenID Connect as a federation protocol.
Problem Description
An Identity Provider (IdP) that issues and handles OpenID Connect requests wishes to allow its users access to an OpenStack Cloud. Currently this is not possible as the only federation protocol supported is SAML.
Proposed Change
- Create a new auth plugin or module for OpenID Connect requests.
- Re-use the mapping engine to map any OpenID Connect attribues that are presented to Keystone attributes.
- Leverage Apache plugin
mod_auth_openidc
to handle the requests.
Note: This feature should be written once the existing Federation code has been re-engineered, as to avoid unnecessary code duplication.
Alternatives
Add an authentication plugin that takes certain OpenID Connect arguments as parameters, and from the plugin we can send a request to the IdP, and handle the response within the plugin.
The main issue with this alternative is that the user sends her credentials to the Service Provider instead of the Identity Provider.
Security Impact
Ensure we are following the OpenID Connect specifications.
Notifications Impact
None
Other End User Impact
python-keystoneclient
would need to be enhanced to
handle OpenID Connect requests.
Performance Impact
None
Other Deployer Impact
None
Developer Impact
None
Implementation
Assignee(s)
Primary assignee:
- stevemar (Steve Martinelli <stevemar@ca.ibm.com>)
- henrynash (Henry Nash <henryn@linux.vnet.ibm.com>)
Work Items
- Add an OpenID Connect auth plugin to handle any necessary OpenID Connect specific data handling.
Dependencies
Relies on re-engineering federation for efficient implementation. See: https://review.openstack.org/#/c/104301/
Documentation Impact
Extensive documentation will have to be provided to describe any new configurations necessary.