Chapter 5. Configuring LDAP on RHOSO


To connect Red Hat OpenStack Services on OpenShift to LDAP so that your OpenStack users authenticate by using pre-established LDAP identities, do the following:

  1. Use the OpenStack CLI to create the domain.
  2. Use RHOSO to create a secret that contains the required configuration.
  3. Mount the secret to the service by using the OpenStackControlPlane custom resource file.

5.1. Configuring LDAP by using Red Hat Identity

Use the OpenStack CLI or the OpenStack Dashboard (horizon) to create OpenStack domains.

Prerequisites

  • A pre-established Red Hat Identity server.

Procedure

  1. Create an OpenStack domain:

    $ openstack domain create <name>

    where:

    <name>
    Specifies the name of your OpenStack domain.
  2. Create a keystone-domains secret called keystone-domains.yaml. This secret is mounted into the /etc/keystone/domains configuration directory:

    apiVersion: v1
    kind: Secret
    metadata:
      name: keystone-domains
      namespace: openstack
    type: Opaque
    stringData:
        keystone.<domain_name>.conf: |
            [identity]
            driver = ldap
            [ldap]
            url = ldaps://localhost
            user = =openstack,ou=Users,dc=director,dc=example,dc=com
            password = RedactedComplexPassword
            suffix = dc=domain,dc=example,dc=com
            user_tree_dn = ou=Users,dc=domain,dc=example,dc=com
            user_objectclass = person
            group_tree_dn = ou=Groups,dc=example,dc=org
            group_objectclass = groupOfNames
            use_tls = True
  3. Create the secret:

    $ oc apply -f keystone-domain-name.yaml
  4. Open your OpenStackCustomResource custom resource (CR) file and add the secret by using the extraMounts field:

    apiVersion: core.openstack.org/v1beta1
    kind: OpenStackControlPlane
    metadata:
      name: openstack
    spec:
      keystone:
        template:
          customServiceConfig: |
            [identity]
            domain_specific_drivers_enabled = True
          extraMounts:
          - name: v1
            region: r1
              extraVol:
                - propagation:
                  - Keystone
                  extraVolType: Conf
                  volumes:
                  - name: keystone-domains
                    secret:
                      secretName: keystone-domains
                  mounts:
                  - name: keystone-domains
                    mountPath: "/etc/keystone/domains"
                    readOnly: true
  5. Apply the changes to your OpenStack control plane CR:

    $ oc apply -f openstack_control_plane.yaml
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2026 Red Hat
Back to top