keystone/etc
Henry Nash 1a50986e7c multi-backend support for identity
The current code has a number of problems and limitations in its
support for having domain-specific backends (e.g. a different LDAP
server per domain).  Not least of the problems is that you cannot
always infer the domain if an API call is just handed a user_id or
group_id. These issues are so severe that this feature is currently
marked as experimental.

This patch fixes these issues by using a mapping layer to store
the domain and local ID for the public facing user and group IDs.
No API changes are required for this new support. An important
consequence of this change is that non-UUID IDs for backends
like LDAP do not escape from keystone.

To ensure backward compatibility with existing single backend
installations, the mapping is not used for the default driver.
An exception to this is that if a cloud provider wants to enable
mapping for the default LDAP driver then they can set a config
option to achieve this.

keystone-manage has been extended to provide options to purge
the mapping table.

Blueprint: multi-backend-uuids

Change-Id: I60f8965bb74b248e6a6c8f141289affa431ee3cf
2014-07-11 20:22:10 +01:00
..
default_catalog.templates rename templated.TemplatedCatalog to templated.Catalog 2014-01-16 08:18:15 -06:00
keystone-paste.ini V3 xml responses should use v3 namespace. 2014-03-06 15:21:17 +08:00
keystone.conf.sample multi-backend support for identity 2014-07-11 20:22:10 +01:00
logging.conf.sample Generate apache-style common access logs 2013-01-31 08:16:21 -06:00
policy.json Token Revocation Extension 2014-03-04 13:42:28 -05:00
policy.v3cloudsample.json Ensure v3policysample correctly limits domain_admin access 2014-03-15 10:02:07 +00:00