OpenStack typo
Change-Id: I86aaa35d07ebe1acb20f8944da7b32bdae317e48
This commit is contained in:
parent
522148593d
commit
d1aea0b3fc
@ -29,9 +29,9 @@ providing user authentication through the LDAP directory.
|
|||||||
|
|
||||||
For the OpenStack Identity service to access LDAP servers, you must
|
For the OpenStack Identity service to access LDAP servers, you must
|
||||||
enable the ``authlogin_nsswitch_use_ldap`` boolean value for SELinux
|
enable the ``authlogin_nsswitch_use_ldap`` boolean value for SELinux
|
||||||
on the Openstack Identity server. To enable and make the option
|
on the server running the OpenStack Identity service. To enable and
|
||||||
persistent across reboots, set the following boolean value as the
|
make the option persistent across reboots, set the following boolean
|
||||||
root user:
|
value as the root user:
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
|
@ -5,25 +5,25 @@
|
|||||||
version="5.0"
|
version="5.0"
|
||||||
xml:id="configuring-keystone-for-ldap-backend">
|
xml:id="configuring-keystone-for-ldap-backend">
|
||||||
<title>Integrate Identity with LDAP</title>
|
<title>Integrate Identity with LDAP</title>
|
||||||
<para>The Openstack Identity Service supports integration with
|
<para>The OpenStack Identity service supports integration with
|
||||||
existing LDAP directories for authentication and authorization
|
existing LDAP directories for authentication and authorization
|
||||||
services.</para>
|
services.</para>
|
||||||
<para>When the Openstack Identity service is configured to use LDAP
|
<para>When the OpenStack Identity service is configured to use LDAP
|
||||||
back ends, you can split authentication (using the
|
back ends, you can split authentication (using the
|
||||||
<emphasis>identity</emphasis> feature) and
|
<emphasis>identity</emphasis> feature) and
|
||||||
authorization (using the
|
authorization (using the
|
||||||
<emphasis>assignment</emphasis> feature).</para>
|
<emphasis>assignment</emphasis> feature).</para>
|
||||||
<para>The identity feature enables administrators to manage
|
<para>The identity feature enables administrators to manage
|
||||||
users and groups by each domain or the Openstack Identity Service entirely.</para>
|
users and groups by each domain or the OpenStack Identity service entirely.</para>
|
||||||
<para>The Assignments feature enables administrators to manage
|
<para>The Assignments feature enables administrators to manage
|
||||||
project role authorization using the Openstack Identity service SQL
|
project role authorization using the OpenStack Identity service SQL
|
||||||
database, while providing user authentication through the
|
database, while providing user authentication through the
|
||||||
LDAP directory.</para>
|
LDAP directory.</para>
|
||||||
<important os="rhel;fedora;centos">
|
<important os="rhel;fedora;centos">
|
||||||
<para>For OpenStack Identity service to access LDAP servers, you must
|
<para>For OpenStack Identity service to access LDAP servers, you must
|
||||||
enable the <option>authlogin_nsswitch_use_ldap</option> boolean
|
enable the <option>authlogin_nsswitch_use_ldap</option> boolean
|
||||||
value for SELinux on the Openstack Identity server. To enable and
|
value for SELinux on the server running the OpenStack Identity service. To
|
||||||
make the option persistent across reboots:</para>
|
enable and make the option persistent across reboots:</para>
|
||||||
<screen><prompt>#</prompt> <userinput>setsebool -P authlogin_nsswitch_use_ldap on</userinput></screen>
|
<screen><prompt>#</prompt> <userinput>setsebool -P authlogin_nsswitch_use_ldap on</userinput></screen>
|
||||||
</important>
|
</important>
|
||||||
<para>Identity configuration is split into two separate back ends: identity
|
<para>Identity configuration is split into two separate back ends: identity
|
||||||
@ -36,7 +36,7 @@
|
|||||||
for assignment back end configuration examples.
|
for assignment back end configuration examples.
|
||||||
Modify these examples as needed.</para>
|
Modify these examples as needed.</para>
|
||||||
<note>
|
<note>
|
||||||
<para>Multiple back ends are supported. You can integrate the Openstack Identity service
|
<para>Multiple back ends are supported. You can integrate the OpenStack Identity service
|
||||||
with a single LDAP server (configure both identity and assignments to
|
with a single LDAP server (configure both identity and assignments to
|
||||||
LDAP, or set identity and assignments back end with SQL or LDAP),
|
LDAP, or set identity and assignments back end with SQL or LDAP),
|
||||||
or multiple back ends using domain-specific configuration files.</para>
|
or multiple back ends using domain-specific configuration files.</para>
|
||||||
@ -127,7 +127,7 @@ auth_pool_connection_lifetime = 60</programlisting>
|
|||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
</variablelist>
|
</variablelist>
|
||||||
<para>When you have finished configuration, restart the Openstack Identity service:</para>
|
<para>When you have finished configuration, restart the OpenStack Identity service:</para>
|
||||||
<screen><prompt>#</prompt> <userinput>service keystone restart</userinput></screen>
|
<screen><prompt>#</prompt> <userinput>service keystone restart</userinput></screen>
|
||||||
<warning><para>During service restart, authentication and
|
<warning><para>During service restart, authentication and
|
||||||
authorization are unavailable.</para></warning>
|
authorization are unavailable.</para></warning>
|
||||||
|
Loading…
x
Reference in New Issue
Block a user