4e39e2abe5
As part of the docs consolidation effort, move the SSL recommendation to the installation guides for each distro. This also corrects the wording: "running in a web server" is not necessarily secure on its own, the web server must be configured to use SSL. Change-Id: If0b547680cbbea4c7f29d82de3f4fe96bd14b4ec
235 lines
6.2 KiB
ReStructuredText
235 lines
6.2 KiB
ReStructuredText
Install and configure
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
This section describes how to install and configure the OpenStack
|
|
Identity service, code-named keystone, on the controller node. For
|
|
scalability purposes, this configuration deploys Fernet tokens and
|
|
the Apache HTTP server to handle requests.
|
|
|
|
.. note::
|
|
|
|
Ensure that you have completed the prerequisite installation steps in the
|
|
`Openstack Install Guide
|
|
<https://docs.openstack.org/install-guide/environment-packages-obs.html#finalize-the-installation>`_
|
|
before proceeding.
|
|
|
|
Prerequisites
|
|
-------------
|
|
|
|
Before you install and configure the Identity service, you must
|
|
create a database.
|
|
|
|
.. note::
|
|
|
|
Before you begin, ensure you have the most recent version of
|
|
``python-pyasn1`` `installed <https://pypi.org/project/pyasn1>`_.
|
|
|
|
#. Use the database access client to connect to the database
|
|
server as the ``root`` user:
|
|
|
|
.. code-block:: console
|
|
|
|
$ mysql -u root -p
|
|
|
|
.. end
|
|
|
|
2. Create the ``keystone`` database:
|
|
|
|
.. code-block:: console
|
|
|
|
MariaDB [(none)]> CREATE DATABASE keystone;
|
|
|
|
.. end
|
|
|
|
#. Grant proper access to the ``keystone`` database:
|
|
|
|
.. code-block:: console
|
|
|
|
MariaDB [(none)]> GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'localhost' \
|
|
IDENTIFIED BY 'KEYSTONE_DBPASS';
|
|
MariaDB [(none)]> GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'%' \
|
|
IDENTIFIED BY 'KEYSTONE_DBPASS';
|
|
|
|
.. end
|
|
|
|
Replace ``KEYSTONE_DBPASS`` with a suitable password.
|
|
|
|
#. Exit the database access client.
|
|
|
|
.. _keystone-install-configure-obs:
|
|
|
|
Install and configure components
|
|
--------------------------------
|
|
|
|
.. include:: shared/note_configuration_vary_by_distribution.rst
|
|
|
|
.. note::
|
|
|
|
Starting with the Newton release, SUSE OpenStack packages are shipping
|
|
with the upstream default configuration files. For example
|
|
``/etc/keystone/keystone.conf``, with customizations in
|
|
``/etc/keystone/keystone.conf.d/010-keystone.conf``. While the
|
|
following instructions modify the default configuration file, adding a
|
|
new file in ``/etc/keystone/keystone.conf.d`` achieves the same
|
|
result.
|
|
|
|
#. Run the following command to install the packages:
|
|
|
|
.. code-block:: console
|
|
|
|
# zypper install openstack-keystone apache2 apache2-mod_wsgi
|
|
|
|
.. end
|
|
|
|
2. Edit the ``/etc/keystone/keystone.conf`` file and complete the following
|
|
actions:
|
|
|
|
* In the ``[database]`` section, configure database access:
|
|
|
|
.. path /etc/keystone/keystone.conf
|
|
.. code-block:: ini
|
|
|
|
[database]
|
|
# ...
|
|
connection = mysql+pymysql://keystone:KEYSTONE_DBPASS@controller/keystone
|
|
|
|
.. end
|
|
|
|
Replace ``KEYSTONE_DBPASS`` with the password you chose for the database.
|
|
|
|
.. note::
|
|
|
|
Comment out or remove any other ``connection`` options in the
|
|
``[database]`` section.
|
|
|
|
* In the ``[token]`` section, configure the Fernet token provider:
|
|
|
|
.. path /etc/keystone/keystone.conf
|
|
.. code-block:: ini
|
|
|
|
[token]
|
|
# ...
|
|
provider = fernet
|
|
|
|
.. end
|
|
|
|
3. Populate the Identity service database:
|
|
|
|
.. code-block:: console
|
|
|
|
# su -s /bin/sh -c "keystone-manage db_sync" keystone
|
|
|
|
.. end
|
|
|
|
4. Initialize Fernet key repositories:
|
|
|
|
.. code-block:: console
|
|
|
|
# keystone-manage fernet_setup --keystone-user keystone --keystone-group keystone
|
|
# keystone-manage credential_setup --keystone-user keystone --keystone-group keystone
|
|
|
|
.. end
|
|
|
|
5. Bootstrap the Identity service:
|
|
|
|
.. note::
|
|
|
|
Before the Queens release, keystone needed to be run on two separate ports to
|
|
accommodate the Identity v2 API which ran a separate admin-only service
|
|
commonly on port 35357. With the removal of the v2 API, keystone can be run
|
|
on the same port for all interfaces.
|
|
|
|
.. code-block:: console
|
|
|
|
# keystone-manage bootstrap --bootstrap-password ADMIN_PASS \
|
|
--bootstrap-admin-url http://controller:5000/v3/ \
|
|
--bootstrap-internal-url http://controller:5000/v3/ \
|
|
--bootstrap-public-url http://controller:5000/v3/ \
|
|
--bootstrap-region-id RegionOne
|
|
|
|
.. end
|
|
|
|
Replace ``ADMIN_PASS`` with a suitable password for an administrative user.
|
|
|
|
Configure the Apache HTTP server
|
|
--------------------------------
|
|
|
|
#. Edit the ``/etc/sysconfig/apache2`` file and configure the
|
|
``APACHE_SERVERNAME`` option to reference the controller node:
|
|
|
|
.. path /etc/sysconfig/apache2
|
|
.. code-block:: shell
|
|
|
|
APACHE_SERVERNAME="controller"
|
|
|
|
.. end
|
|
|
|
#. Create the ``/etc/apache2/conf.d/wsgi-keystone.conf`` file
|
|
with the following content:
|
|
|
|
.. path /etc/apache2/conf.d/wsgi-keystone.conf
|
|
.. code-block:: apache
|
|
|
|
Listen 5000
|
|
|
|
<VirtualHost *:5000>
|
|
WSGIDaemonProcess keystone-public processes=5 threads=1 user=keystone group=keystone display-name=%{GROUP}
|
|
WSGIProcessGroup keystone-public
|
|
WSGIScriptAlias / /usr/bin/keystone-wsgi-public
|
|
WSGIApplicationGroup %{GLOBAL}
|
|
WSGIPassAuthorization On
|
|
ErrorLogFormat "%{cu}t %M"
|
|
ErrorLog /var/log/apache2/keystone.log
|
|
CustomLog /var/log/apache2/keystone_access.log combined
|
|
|
|
<Directory /usr/bin>
|
|
Require all granted
|
|
</Directory>
|
|
</VirtualHost>
|
|
|
|
.. end
|
|
|
|
#. Recursively change the ownership of the ``/etc/keystone`` directory:
|
|
|
|
.. code-block:: console
|
|
|
|
# chown -R keystone:keystone /etc/keystone
|
|
|
|
.. end
|
|
|
|
SSL
|
|
^^^
|
|
|
|
A secure deployment should have the web server configured to use SSL or running
|
|
behind an SSL terminator.
|
|
|
|
Finalize the installation
|
|
-------------------------
|
|
|
|
#. Start the Apache HTTP service and configure it to start when the system
|
|
boots:
|
|
|
|
.. code-block:: console
|
|
|
|
# systemctl enable apache2.service
|
|
# systemctl start apache2.service
|
|
|
|
.. end
|
|
|
|
2. Configure the administrative account
|
|
|
|
.. code-block:: console
|
|
|
|
$ export OS_USERNAME=admin
|
|
$ export OS_PASSWORD=ADMIN_PASS
|
|
$ export OS_PROJECT_NAME=admin
|
|
$ export OS_USER_DOMAIN_NAME=Default
|
|
$ export OS_PROJECT_DOMAIN_NAME=Default
|
|
$ export OS_AUTH_URL=http://controller:5000/v3
|
|
$ export OS_IDENTITY_API_VERSION=3
|
|
|
|
.. end
|
|
|
|
Replace ``ADMIN_PASS`` with the password used in the
|
|
``keystone-manage bootstrap`` command in `keystone-install-configure-obs`_.
|