openstack-ansible-os_keystone/doc/source/configure-federation-idp.rst
Jimmy McCrory aea79e7e52 Remove unused keystone service variables
The keystone_service admin, public, and internal url and v3 variables
were only used in documented examples for federation, not in any tasks.

Change-Id: Ia8a0f8c945f83a5974c4a74890e73002cf219158
2018-02-27 16:34:16 +00:00

4.6 KiB

Configure keystone as a federated Identity Provider

The IdP configuration for keystone provides a dictionary attribute with the key keystone_idp. The following is a complete example:

keystone_idp:
  certfile: "/etc/keystone/ssl/idp_signing_cert.pem"
  keyfile: "/etc/keystone/ssl/idp_signing_key.pem"
  self_signed_cert_subject: "/C=US/ST=Texas/L=San Antonio/O=IT/CN={{ external_lb_vip_address }}"
  regen_cert: false
  idp_entity_id: "{{ keystone_service_publicuri }}/v3/OS-FEDERATION/saml2/idp"
  idp_sso_endpoint: "{{ keystone_service_publicuri }}/v3/OS-FEDERATION/saml2/sso"
  idp_metadata_path: /etc/keystone/saml2_idp_metadata.xml
  service_providers:
    - id: "sp_1"
      auth_url: https://example.com:5000/v3/OS-FEDERATION/identity_providers/idp/protocols/saml2/auth
      sp_url: https://example.com:5000/Shibboleth.sso/SAML2/ECP
  organization_name: example_company
  organization_display_name: Example Corp.
  organization_url: example.com
  contact_company: example_company
  contact_name: John
  contact_surname: Smith
  contact_email: jsmith@example.com
  contact_telephone: 555-55-5555
  contact_type: technical

The following list is a reference of allowed settings:

  • certfile defines the location and filename of the SSL certificate that the IdP uses to sign assertions. This file must be in a location that is accessible to the keystone system user.
  • keyfile defines the location and filename of the SSL private key that the IdP uses to sign assertions. This file must be in a location that is accessible to the keystone system user.
  • self_signed_cert_subject is the subject in the SSL signing certificate. The common name of the certificate must match the hostname configuration in the service provider(s) for this IdP.
  • regen_cert by default is set to False. When set to True, the next Ansible run replaces the existing signing certificate with a new one. This setting is added as a convenience mechanism to renew a certificate when it is close to its expiration date.
  • idp_entity_id is the entity ID. The service providers use this as a unique identifier for each IdP. <keystone-public-endpoint>/OS-FEDERATION/saml2/idp is the value we recommend for this setting.
  • idp_sso_endpoint is the single sign-on endpoint for this IdP. <keystone-public-endpoint>/OS-FEDERATION/saml2/sso> is the value we recommend for this setting.
  • idp_metadata_path is the location and filename where the metadata for this IdP is cached. The keystone system user must have access to this location.
  • service_providers is a list of the known SPs that use the keystone instance as IdP. For each SP, provide three values: id as a unique identifier, auth_url as the authentication endpoint of the SP, and sp_url endpoint for posting SAML2 assertions.
  • organization_name, organization_display_name, organization_url, contact_company, contact_name, contact_surname, contact_email, contact_telephone and contact_type are settings that describe the identity provider. These settings are all optional.

Configuring ADFS 3.0 as an identity provider

To install ADFS:

Configuring ADFS

  1. Ensure the ADFS server trusts the SP's keystone certificate. We recommend to have the ADFS CA (or a public CA) sign a certificate request for the keystone service.

  2. In the ADFS Management Console, choose Add Relying Party Trust.

  3. Select Import data about the relying party published online or on a local network and enter the URL for the SP Metadata ( for example, https://<SP_IP_ADDRESS or DNS_NAME>:5000/Shibboleth.sso/Metadata)

    Note

    ADFS may give a warning message. The message states that ADFS skipped some of the content gathered from metadata because it is not supported by ADFS

  4. Continuing the wizard, select Permit all users to access this relying party.

  5. In the Add Transform Claim Rule Wizard, select Pass Through or Filter an Incoming Claim.

  6. Name the rule (for example, Pass Through UPN) and select the UPN Incoming claim type.

  7. Click OK to apply the rule and finalize the setup.