Chapter 12. Identity (keystone) Parameters
Parameter | Description |
---|---|
|
The email for the OpenStack Identity (keystone) admin account. The default value is |
| The password for the OpenStack Identity (keystone) admin account. |
| The OpenStack Identity (keystone) secret and database password. |
| A list of methods used for authentication. |
| Enabling this option requires users to change their password when the user is created, or upon administrative reset. |
| Indicate whether this resource may be shared with the domain received in the request "origin" header. |
| The first OpenStack Identity (keystone) credential key. Must be a valid key. |
| The second OpenStack Identity (keystone) credential key. Must be a valid key. |
| The maximum number of days a user can go without authenticating before being considered "inactive" and automatically disabled (locked). |
|
Create the member role, useful for undercloud deployment. The default value is |
|
Enable support for federated authentication. The default value is |
| Mapping containing OpenStack Identity (keystone) fernet keys and their paths. |
|
The maximum active keys in the OpenStack Identity (keystone) fernet key repository. The default value is |
| Hash containing the configurations for the LDAP backends configured in keystone. |
|
Trigger to call ldap_backend puppet keystone define. The default value is |
| The number of seconds a user account will be locked when the maximum number of failed authentication attempts (as specified by KeystoneLockoutFailureAttempts) is exceeded. |
| The maximum number of times that a user can fail to authenticate before the user account is locked for the number of seconds specified by KeystoneLockoutDuration. |
| The number of days that a password must be used before the user can change it. This prevents users from changing their passwords immediately in order to wipe out their password history and reuse an old password. |
|
The OpenStack Identity (keystone) notification format. The default value is |
| OpenStack Identity (keystone) notification topics to enable. |
| The client ID to use when handshaking with your OpenID Connect provider. |
| The client secret to use when handshaking with your OpenID Connect provider. |
|
Passphrase to use when encrypting data for OpenID Connect handshake. The default value is |
|
Enable support for OpenIDC federation. The default value is |
|
Enable OAuth 2.0 integration. The default value is |
| The name associated with the IdP in OpenStack Identity (keystone). |
| OAuth 2.0 introspection endpoint for mod_auth_openidc. |
| The url that points to your OpenID Connect provider metadata. |
|
Attribute to be used to obtain the entity ID of the Identity Provider from the environment. The default value is |
|
Response type to be expected from the OpenID Connect provider. The default value is |
| The number of days for which a password will be considered valid before requiring it to be changed. |
| The regular expression used to validate password strength requirements. |
| Describe your password regular expression here in language for humans. |
| OpenStack Identity (keystone) certificate for verifying token validity. |
| OpenStack Identity (keystone) key for signing tokens. |
|
The OpenStack Identity (keystone) token format. The default value is |
| A list of dashboard URLs trusted for single sign-on. |
| This controls the number of previous user password iterations to keep in history, in order to enforce that newly created passwords are unique. |
|
Set the number of workers for the OpenStack Identity (keystone) service. Note that more workers creates a larger number of processes on systems, which results in excess memory consumption. It is recommended to choose a suitable non-default value on systems with high CPU core counts. |
|
Whether director should manage the OpenStack Identity (keystone) fernet keys or not. If set to True, the fernet keys will get the values from the saved keys repository in OpenStack Workflow (mistral) from the |
|
Driver or drivers to handle sending notifications. The default value is |
|
Set a token expiration time in seconds. The default value is |