Questo contenuto non è disponibile nella lingua selezionata.
Chapter 5. Configuring LDAP on RHOSO
To connect Red Hat OpenStack Services on OpenShift to LDAP so that your OpenStack users authenticate by using pre-established LDAP identities, do the following:
- Use the OpenStack CLI to create the domain.
- Use RHOSO to create a secret that contains the required configuration.
-
Mount the secret to the service by using the
OpenStackControlPlanecustom resource file.
5.1. Configuring LDAP by using Red Hat Identity Copia collegamentoCollegamento copiato negli appunti!
Use the OpenStack CLI or the OpenStack Dashboard (horizon) to create OpenStack domains.
Prerequisites
- A pre-established Red Hat Identity server.
Procedure
Create an OpenStack domain:
$ openstack domain create <name>where:
<name>- Specifies the name of your OpenStack domain.
Create a
keystone-domainssecret calledkeystone-domains.yaml. This secret is mounted into the/etc/keystone/domainsconfiguration directory:apiVersion: v1 kind: Secret metadata: name: keystone-domains namespace: openstack type: Opaque stringData: keystone.<domain_name>.conf: | [identity] driver = ldap [ldap] url = ldaps://localhost user = =openstack,ou=Users,dc=director,dc=example,dc=com password = RedactedComplexPassword suffix = dc=domain,dc=example,dc=com user_tree_dn = ou=Users,dc=domain,dc=example,dc=com user_objectclass = person group_tree_dn = ou=Groups,dc=example,dc=org group_objectclass = groupOfNames use_tls = TrueCreate the secret:
$ oc apply -f keystone-domain-name.yamlOpen your
OpenStackCustomResourcecustom resource (CR) file and add the secret by using theextraMountsfield:apiVersion: core.openstack.org/v1beta1 kind: OpenStackControlPlane metadata: name: openstack spec: keystone: template: customServiceConfig: | [identity] domain_specific_drivers_enabled = True extraMounts: - name: v1 region: r1 extraVol: - propagation: - Keystone extraVolType: Conf volumes: - name: keystone-domains secret: secretName: keystone-domains mounts: - name: keystone-domains mountPath: "/etc/keystone/domains" readOnly: trueApply the changes to your OpenStack control plane CR:
$ oc apply -f openstack_control_plane.yaml