openstack-ansible-os_keystone/templates
Jesse Pretorius 9dc6e6f7b7 Implement multi-domain LDAP configuration for Keystone
This patch changes the keystone_ldap configuration to allow multiple
LDAP identity back-end configurations to be implemented.

Example implementation in user_variables.yml:

keystone_ldap:
  Users:
    url: "ldap://10.10.10.10"
    user: "root"
    password: "secrete"
    ...
  Admins:
    url: "ldap://20.20.20.20"
    user: "root"
    password: "secrete"
    ...

This will place two configuration files into /etc/keystone/domains/,
both of which will be configured to use the LDAP driver.

 - keystone.Users.conf
 - keystone.Admins.conf

Each first level key entry is a domain name. Each entry below that
are key-value pairs for the 'ldap' section in the configuration
file.

Note that the reason why only LDAP is catered for is due to the fact
that LDAP is the only supported driver in OpenStack for
Domain-specific configuration files.

Also the reason that only the identity back-end is catered for is that
the LDAP driver for the role, resource and assignment back-ends have
been deprecated and are scheduled for removal in Mitaka.

UpgradeImpact:

- keystone_ldap's first key tier is now the domain name.
  An existing keystone_ldap configuration entry can be converted by
  renaming the 'ldap' key to the domain name 'Default'.
  **Note** that the domain name entry is case-sensitive.

- keystone_ldap_identity_driver has been removed, as the driver
  for ldap is now simply 'ldap' and there are no other back-end
  options for Keystone at this time.

Change-Id: Ifa4c42f7dbcc40a256a3156f74f0150384f9ab87
2016-01-26 13:08:57 +00:00
..
keystone-fernet-rotate.sh.j2 Implement keystone venv support 2015-10-14 13:59:47 -05:00
keystone-httpd.conf.j2 Fixes jinja typo in keystone-httpd.conf.j2 2015-09-09 21:48:55 +00:00
keystone-paste.ini.j2 Update Master SHAs - 17 Jan 2016 2016-01-18 23:58:48 +00:00
keystone-ports.conf.j2 Convert existing roles into galaxy roles 2015-02-18 10:56:25 +00:00
keystone-wsgi.py.j2 Update Master SHAs - 17 Jan 2016 2016-01-18 23:58:48 +00:00
keystone.conf.j2 Implement multi-domain LDAP configuration for Keystone 2016-01-26 13:08:57 +00:00
keystone.domain.conf.j2 Implement multi-domain LDAP configuration for Keystone 2016-01-26 13:08:57 +00:00
policy.json.j2 Update Master SHAs - 17 Jan 2016 2016-01-18 23:58:48 +00:00
shibboleth-attribute-map.xml.j2 Keystone Federation Service Provider Configuration 2015-08-07 08:44:51 +00:00
shibboleth2.xml.j2 Fix keystone shibboleth template to detect ssl usage correctly 2015-09-04 13:30:40 +01:00