Create and manage services and service users The Identity Service enables you to define services, as follows: Service catalog template. The Identity Service acts as a service catalog of endpoints for other OpenStack services. The etc/default_catalog.templates template file defines the endpoints for services. When the Identity Service uses a template file back end, any changes that are made to the endpoints are cached. These changes do not persist when you restart the service or reboot the machine. A SQL back end for the catalog service. When the Identity Service is online, you must add the services to the catalog. When you deploy a system for production, use the SQL back end. The auth_token middleware supports the use of either a shared secret or users for each service. To authenticate users against the Identity Service, you must create a service user for each OpenStack service. For example, create a service user for the Compute, Block Storage, and Networking services. To configure the OpenStack services with service users, create a project for all services and create users for each service. Assign the admin role to each service user and project pair. This role enables users to validate tokens and authenticate and authorize other user requests.
Create a service List the available services: $ keystone service-list +----------------------------------+----------+----------+---------------------------+ | id | name | type | description | +----------------------------------+----------+----------+---------------------------+ | 9816f1faaa7c4842b90fb4821cd09223 | cinder | volume | Cinder Volume Service | | da8cf9f8546b4a428c43d5e032fe4afc | ec2 | ec2 | EC2 Compatibility Layer | | 5f105eeb55924b7290c8675ad7e294ae | glance | image | Glance Image Service | | dcaa566e912e4c0e900dc86804e3dde0 | keystone | identity | Keystone Identity Service | | 4a715cfbc3664e9ebf388534ff2be76a | nova | compute | Nova Compute Service | | 6feb2e0b98874d88bee221974770e372 | s3 | s3 | S3 | +----------------------------------+----------+----------+---------------------------+ To create a service, run this command: $ keystone service-create --name service_name --type service_type --description service_description The arguments are: service_name. The unique name of the new service. service_type. The service type, such as identity, compute, network, image, object-store or any other service identifier string. service_description. The description of the service. For example, to create a swift service of type object-store, run this command: $ keystone service-create --name swift --type object-store --description "object store service" +-------------+----------------------------------+ | Property | Value | +-------------+----------------------------------+ | description | object store service | | enabled | True | | id | 84c23f4b942c44c38b9c42c5e517cd9a | | name | swift | | type | object-store | +-------------+----------------------------------+ To get details for a service, run this command: $ keystone service-get service_ID For example: $ keystone service-get 84c23f4b942c44c38b9c42c5e517cd9a +-------------+----------------------------------+ | Property | Value | +-------------+----------------------------------+ | description | object store service | | enabled | True | | id | 84c23f4b942c44c38b9c42c5e517cd9a | | name | swift | | type | object-store | +-------------+----------------------------------+
Create service users Create a project for the service users. Typically, this project is named service, but choose any name you like: $ keystone tenant-create --name service The output shows the ID for the project. Make a note of this ID. You need it to create service users and assign roles. +-------------+----------------------------------+ | Property | Value | +-------------+----------------------------------+ | description | | | enabled | True | | id | 3e9f3f5399624b2db548d7f871bd5322 | | name | service | +-------------+----------------------------------+ Create service users for the relevant services for your deployment. To assign the admin role to the service user-project pairs, run this command to get the ID of the admin role: $ keystone role-list +----------------------------------+---------------+ | id | name | +----------------------------------+---------------+ | 71ccc37d41c8491c975ae72676db687f | Member | | 149f50a1fe684bfa88dae76a48d26ef7 | ResellerAdmin | | 9fe2ff9ee4384b1894a90878d3e92bab | _member_ | | 6ecf391421604da985db2f141e46a7c8 | admin | | deb4fffd123c4d02a907c2c74559dccf | anotherrole | | bef1f95537914b1295da6aa038ef4de6 | new-role | +----------------------------------+---------------+ Assign the admin role to the user-project pair: $ keystone user-role-add --user SERVICE_USER_ID --role ADMIN_ROLE_ID --tenant SERVICE_PROJECT_ID
Delete a service To delete a specified service, specify its ID: $ keystone service-delete SERVICE_ID