2011-11-09 11:57:59 -08:00
|
|
|
[DEFAULT]
|
2012-05-03 21:14:54 +01:00
|
|
|
# A "shared secret" between keystone and other openstack services
|
|
|
|
# admin_token = ADMIN
|
|
|
|
|
|
|
|
# The IP address of the network interface to listen on
|
2013-09-09 22:45:07 +08:00
|
|
|
# public_bind_host = 0.0.0.0
|
|
|
|
# admin_bind_host = 0.0.0.0
|
2012-05-03 21:14:54 +01:00
|
|
|
|
|
|
|
# The port number which the public service listens on
|
|
|
|
# public_port = 5000
|
|
|
|
|
|
|
|
# The port number which the public admin listens on
|
|
|
|
# admin_port = 35357
|
|
|
|
|
2013-01-18 22:30:12 -06:00
|
|
|
# The base endpoint URLs for keystone that are advertised to clients
|
|
|
|
# (NOTE: this does NOT affect how keystone listens for connections)
|
2013-03-26 17:34:03 -05:00
|
|
|
# public_endpoint = http://localhost:%(public_port)s/
|
|
|
|
# admin_endpoint = http://localhost:%(admin_port)s/
|
2013-01-18 22:30:12 -06:00
|
|
|
|
2012-05-03 21:14:54 +01:00
|
|
|
# The port number which the OpenStack Compute service listens on
|
|
|
|
# compute_port = 8774
|
|
|
|
|
2012-08-30 05:58:15 -05:00
|
|
|
# Path to your policy definition containing identity actions
|
|
|
|
# policy_file = policy.json
|
|
|
|
|
|
|
|
# Rule to check if no matching policy definition is found
|
|
|
|
# FIXME(dolph): This should really be defined as [policy] default_rule
|
|
|
|
# policy_default_rule = admin_required
|
|
|
|
|
2013-02-01 11:18:16 -05:00
|
|
|
# Role for migrating membership relationships
|
|
|
|
# During a SQL upgrade, the following values will be used to create a new role
|
|
|
|
# that will replace records in the user_tenant_membership table with explicit
|
|
|
|
# role grants. After migration, the member_role_id will be used in the API
|
|
|
|
# add_user_to_project, and member_role_name will be ignored.
|
|
|
|
# member_role_id = 9fe2ff9ee4384b1894a90878d3e92bab
|
|
|
|
# member_role_name = _member_
|
|
|
|
|
2013-05-29 14:53:35 -05:00
|
|
|
# enforced by optional sizelimit middleware (keystone.middleware:RequestBodySizeLimiter)
|
|
|
|
# max_request_body_size = 114688
|
|
|
|
|
|
|
|
# limit the sizes of user & tenant ID/names
|
|
|
|
# max_param_size = 64
|
|
|
|
|
|
|
|
# similar to max_param_size, but provides an exception for token values
|
|
|
|
# max_token_size = 8192
|
|
|
|
|
2012-05-03 21:14:54 +01:00
|
|
|
# === Logging Options ===
|
|
|
|
# Print debugging output
|
2012-07-17 16:23:49 -05:00
|
|
|
# (includes plaintext request logging, potentially including passwords)
|
2012-08-22 11:55:56 +08:00
|
|
|
# debug = False
|
2012-05-03 21:14:54 +01:00
|
|
|
|
2013-01-21 15:17:10 +00:00
|
|
|
# Print more verbose output
|
|
|
|
# verbose = False
|
|
|
|
|
2012-05-03 21:14:54 +01:00
|
|
|
# Name of log file to output to. If not set, logging will go to stdout.
|
|
|
|
# log_file = keystone.log
|
|
|
|
|
|
|
|
# The directory to keep log files in (will be prepended to --logfile)
|
|
|
|
# log_dir = /var/log/keystone
|
|
|
|
|
|
|
|
# Use syslog for logging.
|
|
|
|
# use_syslog = False
|
|
|
|
|
|
|
|
# syslog facility to receive log lines
|
|
|
|
# syslog_log_facility = LOG_USER
|
|
|
|
|
2013-11-07 23:15:23 -08:00
|
|
|
# list of logger=LEVEL pairs (list value)
|
|
|
|
#default_log_levels=amqp=WARN,amqplib=WARN,boto=WARN,keystone=INFO,qpid=WARN,sqlalchemy=WARN,suds=INFO
|
|
|
|
|
|
|
|
# The name of logging configuration file. It does not disable
|
|
|
|
# existing loggers, but just appends specified logging
|
|
|
|
# configuration to any other existing logging options. Please
|
|
|
|
# see the Python logging module documentation for details on
|
|
|
|
# logging configuration files. (string value)
|
|
|
|
#log_config_append=<None>
|
2012-05-03 21:14:54 +01:00
|
|
|
|
|
|
|
# A logging.Formatter log message format string which may use any of the
|
|
|
|
# available logging.LogRecord attributes.
|
|
|
|
# log_format = %(asctime)s %(levelname)8s [%(name)s] %(message)s
|
|
|
|
|
|
|
|
# Format string for %(asctime)s in log records.
|
|
|
|
# log_date_format = %Y-%m-%d %H:%M:%S
|
2012-01-09 14:32:02 -08:00
|
|
|
|
2012-07-02 14:07:06 +02:00
|
|
|
# onready allows you to send a notification when the process is ready to serve
|
|
|
|
# For example, to have it notify using systemd, one could set shell command:
|
2012-05-09 21:17:41 +00:00
|
|
|
# onready = systemd-notify --ready
|
2012-07-02 14:07:06 +02:00
|
|
|
# or a module with notify() method:
|
|
|
|
# onready = keystone.common.systemd
|
2012-05-09 21:17:41 +00:00
|
|
|
|
2013-09-06 15:18:44 -05:00
|
|
|
# === Notification Options ===
|
|
|
|
|
|
|
|
# Notifications can be sent when users or projects are created, updated or
|
|
|
|
# deleted. There are three methods of sending notifications: logging (via the
|
|
|
|
# log_file directive), rpc (via a message queue) and no_op (no notifications
|
|
|
|
# sent, the default)
|
|
|
|
|
|
|
|
# notification_driver can be defined multiple times
|
|
|
|
# Do nothing driver (the default)
|
|
|
|
# notification_driver = keystone.openstack.common.notifier.no_op_notifier
|
|
|
|
# Logging driver example (not enabled by default)
|
|
|
|
# notification_driver = keystone.openstack.common.notifier.log_notifier
|
|
|
|
# RPC driver example (not enabled by default)
|
|
|
|
# notification_driver = keystone.openstack.common.notifier.rpc_notifier
|
|
|
|
|
|
|
|
# Default notification level for outgoing notifications
|
|
|
|
# default_notification_level = INFO
|
|
|
|
|
|
|
|
# Default publisher_id for outgoing notifications; included in the payload.
|
|
|
|
# default_publisher_id =
|
|
|
|
|
|
|
|
# AMQP topics to publish to when using the RPC notification driver.
|
|
|
|
# Multiple values can be specified by separating with commas.
|
|
|
|
# The actual topic names will be %s.%(default_notification_level)s
|
|
|
|
# notification_topics = notifications
|
|
|
|
|
|
|
|
# === RPC Options ===
|
|
|
|
|
|
|
|
# For Keystone, these options apply only when the RPC notification driver is
|
|
|
|
# used.
|
|
|
|
|
|
|
|
# The messaging module to use, defaults to kombu.
|
|
|
|
# rpc_backend = keystone.openstack.common.rpc.impl_kombu
|
|
|
|
|
|
|
|
# Size of RPC thread pool
|
|
|
|
# rpc_thread_pool_size = 64
|
|
|
|
|
|
|
|
# Size of RPC connection pool
|
|
|
|
# rpc_conn_pool_size = 30
|
|
|
|
|
|
|
|
# Seconds to wait for a response from call or multicall
|
|
|
|
# rpc_response_timeout = 60
|
|
|
|
|
|
|
|
# Seconds to wait before a cast expires (TTL). Only supported by impl_zmq.
|
|
|
|
# rpc_cast_timeout = 30
|
|
|
|
|
|
|
|
# Modules of exceptions that are permitted to be recreated upon receiving
|
|
|
|
# exception data from an rpc call.
|
|
|
|
# allowed_rpc_exception_modules = keystone.openstack.common.exception,nova.exception,cinder.exception,exceptions
|
|
|
|
|
|
|
|
# If True, use a fake RabbitMQ provider
|
|
|
|
# fake_rabbit = False
|
|
|
|
|
|
|
|
# AMQP exchange to connect to if using RabbitMQ or Qpid
|
|
|
|
# control_exchange = openstack
|
|
|
|
|
2012-01-09 14:32:02 -08:00
|
|
|
[sql]
|
2012-05-03 21:14:54 +01:00
|
|
|
# The SQLAlchemy connection string used to connect to the database
|
|
|
|
# connection = sqlite:///keystone.db
|
2012-01-09 14:32:02 -08:00
|
|
|
|
2012-05-03 21:14:54 +01:00
|
|
|
# the timeout before idle sql connections are reaped
|
|
|
|
# idle_timeout = 200
|
2012-02-06 21:21:46 -05:00
|
|
|
|
2012-01-09 14:32:02 -08:00
|
|
|
[identity]
|
2012-05-03 21:14:54 +01:00
|
|
|
# driver = keystone.identity.backends.sql.Identity
|
2012-01-09 14:32:02 -08:00
|
|
|
|
2013-01-15 21:26:57 -06:00
|
|
|
# This references the domain to use for all Identity API v2 requests (which are
|
|
|
|
# not aware of domains). A domain with this ID will be created for you by
|
|
|
|
# keystone-manage db_sync in migration 008. The domain referenced by this ID
|
|
|
|
# cannot be deleted on the v3 API, to prevent accidentally breaking the v2 API.
|
|
|
|
# There is nothing special about this domain, other than the fact that it must
|
|
|
|
# exist to order to maintain support for your v2 clients.
|
|
|
|
# default_domain_id = default
|
2013-07-25 20:09:45 +01:00
|
|
|
#
|
|
|
|
# A subset (or all) of domains can have their own identity driver, each with
|
|
|
|
# their own partial configuration file in a domain configuration directory.
|
|
|
|
# Only values specific to the domain need to be placed in the domain specific
|
|
|
|
# configuration file. This feature is disabled by default; set
|
|
|
|
# domain_specific_drivers_enabled to True to enable.
|
|
|
|
# domain_specific_drivers_enabled = False
|
|
|
|
# domain_config_dir = /etc/keystone/domains
|
2013-01-15 21:26:57 -06:00
|
|
|
|
2013-05-17 08:39:10 -05:00
|
|
|
# Maximum supported length for user passwords; decrease to improve performance.
|
|
|
|
# max_password_length = 4096
|
|
|
|
|
2013-05-06 14:09:07 -04:00
|
|
|
[credential]
|
|
|
|
# driver = keystone.credential.backends.sql.Credential
|
|
|
|
|
2013-03-20 20:21:45 -05:00
|
|
|
[trust]
|
|
|
|
# driver = keystone.trust.backends.sql.Trust
|
|
|
|
|
|
|
|
# delegation and impersonation features can be optionally disabled
|
|
|
|
# enabled = True
|
|
|
|
|
2013-07-05 06:04:25 +01:00
|
|
|
[os_inherit]
|
|
|
|
# role-assignment inheritance to projects from owning domain can be
|
|
|
|
# optionally enabled
|
|
|
|
# enabled = False
|
|
|
|
|
2012-01-09 14:32:02 -08:00
|
|
|
[catalog]
|
2012-03-26 10:35:28 -07:00
|
|
|
# dynamic, sql-based backend (supports API/CLI-based management commands)
|
2012-05-03 21:14:54 +01:00
|
|
|
# driver = keystone.catalog.backends.sql.Catalog
|
2012-03-26 10:35:28 -07:00
|
|
|
|
|
|
|
# static, file-based backend (does *NOT* support any management commands)
|
2012-05-03 21:14:54 +01:00
|
|
|
# driver = keystone.catalog.backends.templated.TemplatedCatalog
|
|
|
|
|
|
|
|
# template_file = default_catalog.templates
|
2012-01-09 14:32:02 -08:00
|
|
|
|
2013-07-24 16:43:51 -07:00
|
|
|
[endpoint_filter]
|
|
|
|
# extension for creating associations between project and endpoints in order to
|
|
|
|
# provide a tailored catalog for project-scoped token requests.
|
|
|
|
# driver = keystone.contrib.endpoint_filter.backends.sql.EndpointFilter
|
|
|
|
# return_all_endpoints_if_no_filter = True
|
|
|
|
|
2012-01-09 14:32:02 -08:00
|
|
|
[token]
|
2013-06-20 10:06:17 -07:00
|
|
|
# Provides token persistence.
|
2013-06-09 12:17:34 +08:00
|
|
|
# driver = keystone.token.backends.sql.Token
|
2012-01-09 14:32:02 -08:00
|
|
|
|
2013-06-20 10:06:17 -07:00
|
|
|
# Controls the token construction, validation, and revocation operations.
|
2013-07-23 21:16:01 -05:00
|
|
|
# Core providers are keystone.token.providers.[pki|uuid].Provider
|
|
|
|
# provider =
|
2013-06-20 10:06:17 -07:00
|
|
|
|
2012-02-08 16:08:08 -08:00
|
|
|
# Amount of time a token should remain valid (in seconds)
|
2012-05-03 21:14:54 +01:00
|
|
|
# expiration = 86400
|
2012-02-08 16:08:08 -08:00
|
|
|
|
2013-06-17 04:22:06 +00:00
|
|
|
# External auth mechanisms that should add bind information to token.
|
|
|
|
# eg kerberos, x509
|
|
|
|
# bind =
|
|
|
|
|
|
|
|
# Enforcement policy on tokens presented to keystone with bind information.
|
|
|
|
# One of disabled, permissive, strict, required or a specifically required bind
|
|
|
|
# mode e.g. kerberos or x509 to require binding to that authentication.
|
|
|
|
# enforce_token_bind = permissive
|
|
|
|
|
2013-08-23 19:06:42 -07:00
|
|
|
# Token specific caching toggle. This has no effect unless the global caching
|
|
|
|
# option is set to True
|
|
|
|
# caching = True
|
|
|
|
|
2013-08-24 19:16:30 -07:00
|
|
|
# Token specific cache time-to-live (TTL) in seconds.
|
|
|
|
# cache_time =
|
|
|
|
|
2013-08-23 19:06:42 -07:00
|
|
|
# Revocation-List specific cache time-to-live (TTL) in seconds.
|
|
|
|
# revocation_cache_time = 3600
|
|
|
|
|
2013-08-17 03:53:50 -07:00
|
|
|
[cache]
|
|
|
|
# Global cache functionality toggle.
|
|
|
|
# enabled = False
|
|
|
|
|
|
|
|
# Prefix for building the configuration dictionary for the cache region. This
|
|
|
|
# should not need to be changed unless there is another dogpile.cache region
|
|
|
|
# with the same configuration name
|
|
|
|
# config_prefix = cache.keystone
|
|
|
|
|
|
|
|
# Default TTL, in seconds, for any cached item in the dogpile.cache region.
|
|
|
|
# This applies to any cached method that doesn't have an explicit cache
|
|
|
|
# expiration time defined for it.
|
|
|
|
# expiration_time = 600
|
|
|
|
|
|
|
|
# Dogpile.cache backend module. It is recommended that Memcache
|
|
|
|
# (dogpile.cache.memcache) or Redis (dogpile.cache.redis) be used in production
|
|
|
|
# deployments. Small workloads (single process) like devstack can use the
|
|
|
|
# dogpile.cache.memory backend.
|
|
|
|
# backend = keystone.common.cache.noop
|
|
|
|
|
|
|
|
# Arguments supplied to the backend module. Specify this option once per
|
|
|
|
# argument to be passed to the dogpile.cache backend.
|
|
|
|
# Example format: <argname>:<value>
|
|
|
|
# backend_argument =
|
|
|
|
|
|
|
|
# Proxy Classes to import that will affect the way the dogpile.cache backend
|
|
|
|
# functions. See the dogpile.cache documentation on changing-backend-behavior.
|
|
|
|
# Comma delimited list e.g. my.dogpile.proxy.Class, my.dogpile.proxyClass2
|
|
|
|
# proxies =
|
|
|
|
|
|
|
|
# Use a key-mangling function (sha1) to ensure fixed length cache-keys. This
|
|
|
|
# is toggle-able for debugging purposes, it is highly recommended to always
|
|
|
|
# leave this set to True.
|
|
|
|
# use_key_mangler = True
|
|
|
|
|
|
|
|
# Extra debugging from the cache backend (cache keys, get/set/delete/etc calls)
|
|
|
|
# This is only really useful if you need to see the specific cache-backend
|
|
|
|
# get/set/delete calls with the keys/values. Typically this should be left
|
|
|
|
# set to False.
|
|
|
|
# debug_cache_backend = False
|
|
|
|
|
2012-01-09 14:32:02 -08:00
|
|
|
[policy]
|
2012-08-29 02:57:38 -05:00
|
|
|
# driver = keystone.policy.backends.sql.Policy
|
2012-01-09 14:32:02 -08:00
|
|
|
|
2012-01-16 16:31:44 -08:00
|
|
|
[ec2]
|
2012-05-03 21:14:54 +01:00
|
|
|
# driver = keystone.contrib.ec2.backends.kvs.Ec2
|
|
|
|
|
2013-07-18 13:22:09 -05:00
|
|
|
[assignment]
|
|
|
|
# driver =
|
|
|
|
|
2013-08-24 21:07:32 -07:00
|
|
|
# Assignment specific caching toggle. This has no effect unless the global
|
|
|
|
# caching option is set to True
|
|
|
|
# caching = True
|
|
|
|
|
|
|
|
# Assignment specific cache time-to-live (TTL) in seconds.
|
|
|
|
# cache_time =
|
|
|
|
|
2013-03-20 20:02:18 -07:00
|
|
|
[oauth1]
|
|
|
|
# driver = keystone.contrib.oauth1.backends.sql.OAuth1
|
|
|
|
|
|
|
|
# The Identity service may include expire attributes.
|
|
|
|
# If no such attribute is included, then the token lasts indefinitely.
|
|
|
|
# Specify how quickly the request token will expire (in seconds)
|
|
|
|
# request_token_duration = 28800
|
|
|
|
# Specify how quickly the access token will expire (in seconds)
|
|
|
|
# access_token_duration = 86400
|
|
|
|
|
2012-05-23 18:05:11 +00:00
|
|
|
[ssl]
|
|
|
|
#enable = True
|
2013-08-26 15:13:52 -04:00
|
|
|
#certfile = /etc/keystone/ssl/certs/keystone.pem
|
|
|
|
#keyfile = /etc/keystone/ssl/private/keystonekey.pem
|
|
|
|
#ca_certs = /etc/keystone/ssl/certs/ca.pem
|
|
|
|
#ca_key = /etc/keystone/ssl/private/cakey.pem
|
2013-04-04 17:44:01 +10:00
|
|
|
#key_size = 1024
|
|
|
|
#valid_days = 3650
|
|
|
|
#cert_required = False
|
|
|
|
#cert_subject = /C=US/ST=Unset/L=Unset/O=Unset/CN=localhost
|
2012-05-23 18:05:11 +00:00
|
|
|
|
2012-06-22 13:40:17 -04:00
|
|
|
[signing]
|
2013-07-18 08:23:52 -07:00
|
|
|
# Deprecated in favor of provider in the [token] section
|
2013-07-23 21:16:01 -05:00
|
|
|
# Allowed values are PKI or UUID
|
|
|
|
#token_format =
|
2013-07-18 08:23:52 -07:00
|
|
|
|
2013-08-26 15:13:52 -04:00
|
|
|
#certfile = /etc/keystone/ssl/certs/signing_cert.pem
|
|
|
|
#keyfile = /etc/keystone/ssl/private/signing_key.pem
|
|
|
|
#ca_certs = /etc/keystone/ssl/certs/ca.pem
|
|
|
|
#ca_key = /etc/keystone/ssl/private/cakey.pem
|
2013-01-22 15:05:45 +01:00
|
|
|
#key_size = 2048
|
2012-06-22 13:40:17 -04:00
|
|
|
#valid_days = 3650
|
2013-04-04 17:44:01 +10:00
|
|
|
#cert_subject = /C=US/ST=Unset/L=Unset/O=Unset/CN=www.example.com
|
2012-05-23 18:05:11 +00:00
|
|
|
|
2012-05-03 21:14:54 +01:00
|
|
|
[ldap]
|
|
|
|
# url = ldap://localhost
|
|
|
|
# user = dc=Manager,dc=example,dc=com
|
2012-06-22 13:40:17 -04:00
|
|
|
# password = None
|
2012-05-03 21:14:54 +01:00
|
|
|
# suffix = cn=example,cn=com
|
|
|
|
# use_dumb_member = False
|
2012-09-27 13:53:54 +02:00
|
|
|
# allow_subtree_delete = False
|
2012-10-16 23:25:03 +02:00
|
|
|
# dumb_member = cn=dumb,dc=example,dc=com
|
2013-03-04 12:19:57 -06:00
|
|
|
|
|
|
|
# Maximum results per page; a value of zero ('0') disables paging (default)
|
2013-02-19 08:30:38 +01:00
|
|
|
# page_size = 0
|
2012-05-03 21:14:54 +01:00
|
|
|
|
2013-03-11 23:11:52 -04:00
|
|
|
# The LDAP dereferencing option for queries. This can be either 'never',
|
|
|
|
# 'searching', 'always', 'finding' or 'default'. The 'default' option falls
|
|
|
|
# back to using default dereferencing configured by your ldap.conf.
|
|
|
|
# alias_dereferencing = default
|
|
|
|
|
2013-02-11 17:15:23 +01:00
|
|
|
# The LDAP scope for queries, this can be either 'one'
|
|
|
|
# (onelevel/singleLevel) or 'sub' (subtree/wholeSubtree)
|
|
|
|
# query_scope = one
|
|
|
|
|
2012-05-03 21:14:54 +01:00
|
|
|
# user_tree_dn = ou=Users,dc=example,dc=com
|
2012-10-10 08:46:51 +02:00
|
|
|
# user_filter =
|
2012-05-03 21:14:54 +01:00
|
|
|
# user_objectclass = inetOrgPerson
|
|
|
|
# user_id_attribute = cn
|
2012-07-26 15:30:39 -04:00
|
|
|
# user_name_attribute = sn
|
2012-10-16 23:25:03 +02:00
|
|
|
# user_mail_attribute = email
|
|
|
|
# user_pass_attribute = userPassword
|
2012-10-29 15:07:58 +01:00
|
|
|
# user_enabled_attribute = enabled
|
|
|
|
# user_enabled_mask = 0
|
|
|
|
# user_enabled_default = True
|
2013-09-12 00:11:45 -07:00
|
|
|
# user_attribute_ignore = default_project_id,tenants
|
|
|
|
# user_default_project_id_attribute =
|
2012-09-20 09:15:05 +02:00
|
|
|
# user_allow_create = True
|
|
|
|
# user_allow_update = True
|
|
|
|
# user_allow_delete = True
|
2013-01-11 17:19:33 +04:00
|
|
|
# user_enabled_emulation = False
|
|
|
|
# user_enabled_emulation_dn =
|
2012-05-03 21:14:54 +01:00
|
|
|
|
2013-06-17 15:18:44 -05:00
|
|
|
# tenant_tree_dn = ou=Projects,dc=example,dc=com
|
2012-10-10 08:46:51 +02:00
|
|
|
# tenant_filter =
|
2012-05-03 21:14:54 +01:00
|
|
|
# tenant_objectclass = groupOfNames
|
2013-02-24 23:35:48 -06:00
|
|
|
# tenant_domain_id_attribute = businessCategory
|
2012-05-03 21:14:54 +01:00
|
|
|
# tenant_id_attribute = cn
|
|
|
|
# tenant_member_attribute = member
|
2012-07-26 15:30:39 -04:00
|
|
|
# tenant_name_attribute = ou
|
2012-10-16 23:25:03 +02:00
|
|
|
# tenant_desc_attribute = desc
|
2012-10-29 15:07:58 +01:00
|
|
|
# tenant_enabled_attribute = enabled
|
|
|
|
# tenant_attribute_ignore =
|
2012-09-20 09:15:05 +02:00
|
|
|
# tenant_allow_create = True
|
|
|
|
# tenant_allow_update = True
|
|
|
|
# tenant_allow_delete = True
|
2013-01-11 17:19:33 +04:00
|
|
|
# tenant_enabled_emulation = False
|
|
|
|
# tenant_enabled_emulation_dn =
|
2012-05-03 21:14:54 +01:00
|
|
|
|
|
|
|
# role_tree_dn = ou=Roles,dc=example,dc=com
|
2012-10-10 08:46:51 +02:00
|
|
|
# role_filter =
|
2012-05-03 21:14:54 +01:00
|
|
|
# role_objectclass = organizationalRole
|
|
|
|
# role_id_attribute = cn
|
2012-10-16 23:25:03 +02:00
|
|
|
# role_name_attribute = ou
|
2012-05-03 21:14:54 +01:00
|
|
|
# role_member_attribute = roleOccupant
|
2012-10-16 23:25:03 +02:00
|
|
|
# role_attribute_ignore =
|
2012-09-20 09:15:05 +02:00
|
|
|
# role_allow_create = True
|
|
|
|
# role_allow_update = True
|
|
|
|
# role_allow_delete = True
|
2011-11-09 11:57:59 -08:00
|
|
|
|
2013-01-22 13:58:22 -06:00
|
|
|
# group_tree_dn =
|
|
|
|
# group_filter =
|
|
|
|
# group_objectclass = groupOfNames
|
|
|
|
# group_id_attribute = cn
|
|
|
|
# group_name_attribute = ou
|
|
|
|
# group_member_attribute = member
|
|
|
|
# group_desc_attribute = desc
|
|
|
|
# group_attribute_ignore =
|
|
|
|
# group_allow_create = True
|
|
|
|
# group_allow_update = True
|
|
|
|
# group_allow_delete = True
|
|
|
|
|
2013-03-25 15:23:15 -05:00
|
|
|
# ldap TLS options
|
|
|
|
# if both tls_cacertfile and tls_cacertdir are set then
|
|
|
|
# tls_cacertfile will be used and tls_cacertdir is ignored
|
|
|
|
# valid options for tls_req_cert are demand, never, and allow
|
|
|
|
# use_tls = False
|
|
|
|
# tls_cacertfile =
|
|
|
|
# tls_cacertdir =
|
|
|
|
# tls_req_cert = demand
|
|
|
|
|
2013-03-21 14:19:48 -04:00
|
|
|
# Additional attribute mappings can be used to map ldap attributes to internal
|
|
|
|
# keystone attributes. This allows keystone to fulfill ldap objectclass
|
|
|
|
# requirements. An example to map the description and gecos attributes to a
|
|
|
|
# user's name would be:
|
|
|
|
# user_additional_attribute_mapping = description:name, gecos:name
|
|
|
|
#
|
|
|
|
# domain_additional_attribute_mapping =
|
|
|
|
# group_additional_attribute_mapping =
|
|
|
|
# role_additional_attribute_mapping =
|
|
|
|
# project_additional_attribute_mapping =
|
|
|
|
# user_additional_attribute_mapping =
|
|
|
|
|
2013-01-08 08:46:20 -08:00
|
|
|
[auth]
|
2013-03-20 20:02:18 -07:00
|
|
|
methods = external,password,token,oauth1
|
2013-07-12 10:23:38 -04:00
|
|
|
#external = keystone.auth.plugins.external.ExternalDefault
|
2013-03-06 12:53:47 -06:00
|
|
|
password = keystone.auth.plugins.password.Password
|
|
|
|
token = keystone.auth.plugins.token.Token
|
2013-03-20 20:02:18 -07:00
|
|
|
oauth1 = keystone.auth.plugins.oauth1.OAuth
|
2013-01-08 08:46:20 -08:00
|
|
|
|
2013-03-09 01:58:33 +01:00
|
|
|
[paste_deploy]
|
|
|
|
# Name of the paste configuration file that defines the available pipelines
|
|
|
|
config_file = keystone-paste.ini
|