keystone/etc
Adam Young d95adc1ac8 extracting credentials
Moves the credentials API into its own backend.

LDAP was not going to be able to support credentials.

Even with a custom schema, many people are using LDAP in read only
mode, which means that they would not be able to use the  credentials
API at all.  By splitting it out, we have a workable solution for
both SQL and LDAP Identity backends.

Drops the Foreign Key constraints off the Credentials table, as there
is now no guaranttee that users are stored in the same backend.

Blueprint extract-credentials-id

Change-Id: I10ad4b36c6f03d1712621eaffcfefa48a5453aff
2013-05-17 11:08:54 -04:00
..
default_catalog.templates Fix default port for identity.internalURL 2012-03-15 11:38:29 +01:00
keystone.conf.sample extracting credentials 2013-05-17 11:08:54 -04:00
logging.conf.sample Generate apache-style common access logs 2013-01-31 08:16:21 -06:00
policy.json Add rule for list_groups_for_user in policy.json 2013-04-23 17:39:07 +08:00