.. -*- rst -*- ===== Roles ===== OpenStack services typically determine whether a user's API request should be allowed using Role Based Access Control (RBAC). For OpenStack this means the service compares the roles that user has on the project (as indicated by the roles in the token), against the roles required for the API in question (as defined in the service's policy file). A user obtains roles on a project by having these assigned to them via the Identity service API. Roles must initially be created as entities via the Identity services API and, once created, can then be assigned. You can assign roles to a user or group on a project, including projects owned by other domains. You can also assign roles to a user or group on a domain, although this is only currently relevant for using a domain scoped token to execute domain-level Identity service API requests. The creation, checking and deletion of role assignments is done with each of the attributes being specified in the URL. For example to assign a role to a user on a project:: PUT /v3/projects/{project_id}/users/{user_id}/roles/{role_id} You can also list roles assigned to a specified domain, project, or user using this form of API, however a more generalized API for list assignments is provided where query parameters are used to filter the set of assignments returned in the collection. For example: - List role assignments for the specified user:: GET /role_assignments?user.id={user_id} - List role assignments for the specified project:: GET /role_assignments?scope.project.id={project_id} Since Identity API v3.6, you can also list all role assignments within a tree of projects, for example the following would list all role assignments for a specified project and its sub-projects:: GET /role_assignments?scope.project.id={project_id}&include_subtree=true If you specify ``include_subtree=true``, you must also specify the ``scope.project.id``. Otherwise, this call returns the ``Bad Request (400)`` response code. Each role assignment entity in the collection contains a link to the assignment that created the entity. As mentioned earlier, role assignments can be made to a user or a group on a particular project or domain. A user who is a member of a group that has a role assignment, will also be treated as having that role assignment by virtue of their group membership. The *effective* role assignments of a user (on a given project or domain) therefore consists of any direct assignments they have, plus any they gain by virtue of membership of groups that also have assignments on the given project or domain. This set of effective role assignments is what is placed in the token for reference by services wishing to check policy. You can list the effective role assignments using the ``effective`` query parameter at the user, project, and domain level: - Determine what a user can actually do:: GET /role_assignments?user.id={user_id}&effective - Get the equivalent set of role assignments that are included in a project-scoped token response:: GET /role_assignments?user.id={user_id}&scope.project.id={project_id}&effective When listing in effective mode, since the group assignments have been effectively expanded out into assignments for each user, the group role assignment entities themselves are not returned in the collection. However, in the response, the ``links`` entity section for each assignment gained by virtue of group membership will contain a URL that enables access to the membership of the group. Assign role to group on project =============================== .. rest_method:: PUT /v3/projects/{project_id}/groups/{group_id}/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/project_group_role`` Assigns a role to a group on a project. Normal response codes: 204 Error response codes: 413,415,405,404,403,401,400,503,409 Request ------- .. rest_parameters:: parameters.yaml - project_id: project_id_path - group_id: group_id_path - role_id: role_id_path Check whether group has role assignment on project ================================================== .. rest_method:: HEAD /v3/projects/{project_id}/groups/{group_id}/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/project_group_role`` Validates that a group has a role assignment on a project. Normal response codes: 204 Error response codes: 413,405,404,403,401,400,503 Request ------- .. rest_parameters:: parameters.yaml - project_id: project_id_path - group_id: group_id_path - role_id: role_id_path Unassign role from group on project =================================== .. rest_method:: DELETE /v3/projects/{project_id}/groups/{group_id}/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/project_group_role`` Unassigns a role from a group on a project. Normal response codes: 204 Error response codes: 413,415,405,404,403,401,400,503,409 Request ------- .. rest_parameters:: parameters.yaml - project_id: project_id_path - group_id: group_id_path - role_id: role_id_path Assign role to user on project ============================== .. rest_method:: PUT /v3/projects/{project_id}/users/{user_id}/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/project_user_role`` Assigns a role to a user on a project. Normal response codes: 204 Error response codes: 413,415,405,404,403,401,400,503,409 Request ------- .. rest_parameters:: parameters.yaml - project_id: project_id_path - user_id: user_id_path - role_id: role_id_path Check whether user has role assignment on project ================================================= .. rest_method:: HEAD /v3/projects/{project_id}/users/{user_id}/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/project_user_role`` Validates that a user has a role on a project. Normal response codes: 204 Error response codes: 413,405,404,403,401,400,503 Request ------- .. rest_parameters:: parameters.yaml - project_id: project_id_path - user_id: user_id_path - role_id: role_id_path Unassign role from user on project ================================== .. rest_method:: DELETE /v3/projects/{project_id}/users/{user_id}/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/project_user_role`` Unassigns a role from a user on a project. Normal response codes: 204 Error response codes: 413,415,405,404,403,401,400,503,409 Request ------- .. rest_parameters:: parameters.yaml - project_id: project_id_path - user_id: user_id_path - role_id: role_id_path List role assignments for user on project ========================================= .. rest_method:: GET /v3/projects/{project_id}/users/{user_id}/roles Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/project_user_role`` Lists role assignments for a user on a project. Normal response codes: 200 Error response codes: 413,405,404,403,401,400,503 Request ------- .. rest_parameters:: parameters.yaml - project_id: project_id_path - user_id: user_id_path Response Example ---------------- .. literalinclude:: ./samples/admin/project-user-roles-list-response.json :language: javascript List role assignments for group on project ========================================== .. rest_method:: GET /v3/projects/{project_id}/groups/{group_id}/roles Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/project_user_role`` Lists role assignments for a group on a project. Normal response codes: 200 Error response codes: 413,405,404,403,401,400,503 Request ------- .. rest_parameters:: parameters.yaml - project_id: project_id_path - group_id: group_id_path Response Example ---------------- .. literalinclude:: ./samples/admin/project-group-roles-list-response.json :language: javascript The functionality of this request can also be achieved using the generalized list assignments API:: GET /role_assignments?group.id={group_id}&scope.project.id={project_id} Assign role to group on domain ============================== .. rest_method:: PUT /v3/domains/{domain_id}/groups/{group_id}/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/domain_group_role`` Assigns a role to a group on a domain. Normal response codes: 204 Error response codes: 413,415,405,404,403,401,400,503,409 Request ------- .. rest_parameters:: parameters.yaml - domain_id: domain_id_path - group_id: group_id_path - role_id: role_id_path Check whether group has role assignment on domain ================================================= .. rest_method:: HEAD /v3/domains/{domain_id}/groups/{group_id}/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/domain_group_role`` Validates that a group has a role assignment on a domain. Normal response codes: 204 Error response codes: 413,405,404,403,401,400,503 Request ------- .. rest_parameters:: parameters.yaml - domain_id: domain_id_path - group_id: group_id_path - role_id: role_id_path Unassign role from group on domain ================================== .. rest_method:: DELETE /v3/domains/{domain_id}/groups/{group_id}/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/domain_group_role`` Unassigns a role from a group on a domain. Normal response codes: 204 Error response codes: 413,415,405,404,403,401,400,503,409 Request ------- .. rest_parameters:: parameters.yaml - domain_id: domain_id_path - group_id: group_id_path - role_id: role_id_path List role assignments for user on domain ======================================== .. rest_method:: GET /v3/domains/{domain_id}/users/{user_id}/roles Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/domain_user_roles`` Lists role assignments for a user on a domain. Normal response codes: 200 Error response codes: 413,405,404,403,401,400,503 Request ------- .. rest_parameters:: parameters.yaml - domain_id: domain_id_path - user_id: user_id_path Response Parameters ------------------- .. rest_parameters:: parameters.yaml - roles: roles - id: role_id_response_body - links: link_response_body - name: role_name_response_body Response Example ---------------- .. literalinclude:: ./samples/admin/domain-user-roles-list-response.json :language: javascript The functionality of this request can also be achieved using the generalized list assignments API:: GET /role_assignments?user.id={user_id}&scope.domain.id={domain_id} List roles ========== .. rest_method:: GET /v3/roles Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/roles`` Lists roles. Normal response codes: 200 Error response codes: 413,405,404,403,401,400,503 Request ------- .. rest_parameters:: parameters.yaml - name: role_name_query Response Parameters ------------------- .. rest_parameters:: parameters.yaml - links: link_collection - roles: roles - id: role_id_response_body - links: link_response_body - name: role_name_response_body Response Example ---------------- .. literalinclude:: ./samples/admin/roles-list-response.json :language: javascript Create role =========== .. rest_method:: POST /v3/roles Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/roles`` Creates a role. Normal response codes: 201 Error response codes: 413,415,405,404,403,401,400,503,409 Request ------- .. rest_parameters:: parameters.yaml - role: role - name: role_name_create_body Request Example --------------- .. literalinclude:: ./samples/admin/role-create-request.json :language: javascript Response Parameters ------------------- .. rest_parameters:: parameters.yaml - role: role - id: role_id_response_body - links: link_response_body - name: role_name_response_body Assign role to user on domain ============================= .. rest_method:: PUT /v3/domains/{domain_id}/users/{user_id}/roles/{role_id} Relationship: ``http://developer.openstack.org/api-ref-identity-v3.html#assignRoleToUser-domain`` Assigns a role to a user on a domain. Normal response codes: 204 Error response codes: 413,415,405,404,403,401,400,503,409 Request ------- .. rest_parameters:: parameters.yaml - domain_id: domain_id_path - user_id: user_id_path - role_id: role_id_path Check whether user has role assignment on domain ================================================ .. rest_method:: HEAD /v3/domains/{domain_id}/users/{user_id}/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/domain_user_role`` Validates that a user has a role assignment on a domain. Normal response codes: 204 Error response codes: 413,405,404,403,401,400,503 Request ------- .. rest_parameters:: parameters.yaml - domain_id: domain_id_path - user_id: user_id_path - role_id: role_id_path Unassigns role from user on domain ================================== .. rest_method:: DELETE /v3/domains/{domain_id}/users/{user_id}/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/domain_user_role`` Unassigns a role from a user on a domain. Normal response codes: 204 Error response codes: 413,415,405,404,403,401,400,503,409 Request ------- .. rest_parameters:: parameters.yaml - domain_id: domain_id_path - user_id: user_id_path - role_id: role_id_path List role assignments for group on domain ========================================= .. rest_method:: GET /v3/domains/{domain_id}/groups/{group_id}/roles Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/domain_group_roles`` Lists role assignments for a group on a domain. Normal response codes: 200 Error response codes: 413,405,404,403,401,400,503 Request ------- .. rest_parameters:: parameters.yaml - domain_id: domain_id_path - group_id: group_id_path Response Example ---------------- .. literalinclude:: ./samples/admin/domain-group-roles-list-response.json :language: javascript The functionality of this request can also be achieved using the generalized list assignments API:: GET /role_assignments?group.id={group_id}&scope.domain.id={domain_id} List role assignments ===================== .. rest_method:: GET /v3/role_assignments Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/role_assignments`` Lists role assignments. Normal response codes: 200 Error response codes: 413,405,404,403,401,400,503 Request ------- .. rest_parameters:: parameters.yaml - effective: effective_query - include_names: include_names_query - include_subtree: include_subtree_query - group.id: group_id_query - role.id: role_id_query - scope.domain.id: scope_domain_id_query - scope.project.id: scope_project_id_query - user.id: user_id_query Response Parameters ------------------- .. rest_parameters:: parameters.yaml - role_assignments: role_assignments Response Example ---------------- .. literalinclude:: ./samples/admin/role-assignments-list-response.json :language: javascript Show role details ================= .. rest_method:: GET /v3/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/role`` Shows details for a role. Normal response codes: 200 Error response codes: 413,405,404,403,401,400,503 Request ------- .. rest_parameters:: parameters.yaml - role_id: role_id_path Response Parameters ------------------- .. rest_parameters:: parameters.yaml - role: role - id: role_id_response_body - links: link_response_body - name: role_name_response_body Response Example ---------------- .. literalinclude:: ./samples/admin/role-show-response.json :language: javascript Update role =========== .. rest_method:: PATCH /v3/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/role`` Updates a role. Normal response codes: 200 Error response codes: 413,415,405,404,403,401,400,503,409 Request ------- .. rest_parameters:: parameters.yaml - role_id: role_id_path - role: role - name: role_name_update_body Request Example --------------- .. literalinclude:: ./samples/admin/role-update-request.json :language: javascript Response Parameters ------------------- .. rest_parameters:: parameters.yaml - role: role - id: role_id_response_body - links: link_response_body - name: role_name_response_body Response Example ---------------- .. literalinclude:: ./samples/admin/role-update-response.json :language: javascript Delete role =========== .. rest_method:: DELETE /v3/roles/{role_id} Relationship: ``http://docs.openstack.org/api/openstack-identity/3/rel/role`` Deletes a role. Normal response codes: 204 Error response codes: 413,415,405,404,403,401,400,503,409 Request ------- .. rest_parameters:: parameters.yaml - role_id: role_id_path List implied roles for role =========================== .. rest_method:: GET /v3/roles/{prior_role_id}/implies Lists implied roles for a role. Relationship: ``http://developer.openstack.org/api-ref-identity-v3.html#getRoleInference`` Normal response codes: 200 Error response codes: 401, 404 Request ------- .. rest_parameters:: parameters.yaml - prior_role_id: prior_role_id Response Parameters ------------------- .. rest_parameters:: parameters.yaml - role_inference: role_inference_body - prior_role: prior_role_body - implies: implies_role_array_body - id: role_id_response_body - links: link_response_body - name: role_name_response_body Response Example ---------------- .. literalinclude:: ./samples/admin/list-implied-roles-for-role-response.json :language: javascript Create role inference rule ========================== .. rest_method:: PUT /v3/roles/{prior_role_id}/implies/{implies_role_id} Creates a role inference rule. Relationship: ``http://developer.openstack.org/api-ref-identity-v3.html#createRoleInference`` Normal response codes: 201 Error response codes: 401, 404 Request ------- .. rest_parameters:: parameters.yaml - prior_role_id: prior_role_id - implies_role_id: implies_role_id Response Parameters ------------------- .. rest_parameters:: parameters.yaml - role_inference: role_inference_body - prior_role: prior_role_body - implies: implies_role_object_body - id: role_id_response_body - links: link_response_body - name: role_name_response_body Response Example ---------------- .. literalinclude:: ./samples/admin/create-role-inferences-response.json :language: javascript Get role inference rule ======================= .. rest_method:: GET /v3/roles/{prior_role_id}/implies/{implies_role_id} Gets a role inference rule. Relationship: ``http://developer.openstack.org/api-ref-identity-v3.html#getRoleInference`` Normal response codes: 200 Error response codes: 401, 404 Request ------- .. rest_parameters:: parameters.yaml - prior_role_id: prior_role_id - implies_role_id: implies_role_id Response Parameters ------------------- .. rest_parameters:: parameters.yaml - role_inference: role_inference_body - prior_role: prior_role_body - implies: implies_role_object_body - id: role_id_response_body - links: link_response_body - name: role_name_response_body Response Example ---------------- .. literalinclude:: ./samples/admin/get-role-inferences-response.json :language: javascript Confirm role inference rule =========================== .. rest_method:: HEAD /v3/roles/{prior_role_id}/implies/{implies_role_id} Checks a role role inference rule. Relationship: ``http://developer.openstack.org/api-ref-identity-v3.html#getRoleInference`` Normal response codes: 204 Error response codes: 401, 404 Request ------- .. rest_parameters:: parameters.yaml - prior_role_id: prior_role_id - implies_role_id: implies_role_id Response Example ---------------- Status: 204 No Content Delete role inference rule ========================== .. rest_method:: DELETE /v3/roles/{prior_role_id}/implies/{implies_role_id} Deletes a role inference rule. Relationship: ``http://developer.openstack.org/api-ref-identity-v3.html#deleteRoleInference`` Normal response codes: 204 Error response codes: 401, 404 .. rest_parameters:: parameters.yaml - prior_role_id: prior_role_id - implies_role_id: implies_role_id Response Example ---------------- Status: 204 No Content List all role inference rules ============================= .. rest_method:: GET /v3/role_inferences Lists all role inference rules. Normal response codes: 200 Error response codes: 401, 404 Relationship: ``http://developer.openstack.org/api-ref-identity-v3.html#getRoleInference`` Response Parameters ------------------- .. rest_parameters:: parameters.yaml - role_inferences: role_inference_array_body - prior_role: prior_role_body - implies: implies_role_object_body - id: role_id_response_body - links: link_response_body - name: role_name_response_body Response Example ---------------- .. literalinclude:: ./samples/admin/role-inferences-response.json :language: javascript