Este conteúdo não está disponível no idioma selecionado.
Chapter 1. Active Directory Integration
This chapter describes how to integrate Identity Service (keystone) with Active Directory Domain Services. In this use case, Identity Service authenticates certain Active Directory Domain Services (AD DS) users, while retaining authorization settings and critical service accounts in the Identity Service database. As a result, Identity Service has read-only access to AD DS for user account authentication, while retaining management over the privileges assigned to authenticated accounts.
If you are using Red Hat OpenStack Platform director, then you will need to be aware that some of configuration files referenced below are managed by Puppet. Consequently, any custom configuration you add might be overwritten whenever you run the openstack overcloud deploy
process. To apply these settings to director-based deployments, see Chapter 4, Using domain-specific LDAP backends with director.
1.1. Key terms Copiar o linkLink copiado para a área de transferência!
- Authentication - The process of using a password to verify that the user is who they claim to be.
- Authorization - Validating that authenticated users have proper permissions to the resources they are attempting to access.
- Domain - This term is not the same as an AD DS domain, and instead refers to the additional namespaces that are configured in Identity Service for partitioning users, groups, and projects. These separate domains can be configured to authenticate users in different LDAP or AD DS environments.
1.2. Assumptions Copiar o linkLink copiado para a área de transferência!
This example deployment makes the following assumptions:
- Active Directory Domain Services is configured and operational.
- Red Hat OpenStack Platform is configured and operational.
- DNS name resolution is fully functional and all hosts are registered appropriately.
- AD DS authentication traffic is encrypted with LDAPS, using port 636.
1.3. Impact Statement Copiar o linkLink copiado para a área de transferência!
These steps allow AD DS users to authenticate to OpenStack and access resources. OpenStack service accounts (such as keystone and glance), and authorization management (permissions, roles, projects) will remain in the Identity Service database. Permissions and roles are assigned to the AD DS accounts using Identity Service management tools.
1.3.1. High Availability options Copiar o linkLink copiado para a área de transferência!
This configuration creates a dependency on the availability of a single Active Directory Domain Controller; Project users will be affected if Identity Service is unable to authenticate to the AD Domain Controller. A number of options are available to manage this risk; for example, you might configure Identity Service to query a DNS alias or a load balancing appliance, rather than an individual AD Domain Controller. You can also configure keystone to query a different Domain Controller, should one become unavailable. See Section 1.14, “Configure high availability” for more information.
1.4. Outage requirements Copiar o linkLink copiado para a área de transferência!
- The Identity Service will need to be restarted to add the AD DS back end.
- The Compute services on all nodes will need to be restarted in order to switch over to keystone v3.
- Users will be unable to access the dashboard until their accounts have been created in AD DS. To reduce downtime, consider pre-staging the AD DS accounts well in advance of this change.
1.5. Firewall configuration Copiar o linkLink copiado para a área de transferência!
If firewalls are filtering traffic between AD DS and OpenStack, you will need to allow access through the following port:
Source | Destination | Type | Port |
---|---|---|---|
OpenStack Controller Node | Active Directory Domain Controller | LDAPS | TCP 636 |
1.6. Configure Active Directory Domain Services Copiar o linkLink copiado para a área de transferência!
This section describes the tasks that Active Directory administrators will need to complete:
Task | Details |
Create a service account. |
This can be named according to your naming convention for service accounts, for example: |
Create a user group. |
If a user needs access to OpenStack, they must be a member of this group. This can be named according to your naming convention for user groups, for example: |
Create the Project groups. |
Each OpenStack Project will require a corresponding AD group. For example, |
Configure the service account. |
The service account |
Export the LDAPS public key. |
Export the public key (not the private key) in the following format: |
Send the key to the OpenStack administrators. | The OpenStack administrators will use this key to encrypt LDAPS communications between OpenStack and Active Directory. |
Retrieve the NetBIOS name of your AD DS domain. | The OpenStack administrators will use this name for the Keystone domain, allowing consistent domain naming between the environments. |
For example, the procedure below shows the PowerShell commands that would be run on the Active Directory Domain Controller:
Create the LDAP lookup account. This account is used by Identity Service to query the AD DS LDAP service:
PS C:\> New-ADUser -SamAccountName svc-ldap -Name "svc-ldap" -GivenName LDAP -Surname Lookups -UserPrincipalName svc-ldap@lab.local -Enabled $false -PasswordNeverExpires $true -Path 'OU=labUsers,DC=lab,DC=local'
PS C:\> New-ADUser -SamAccountName svc-ldap -Name "svc-ldap" -GivenName LDAP -Surname Lookups -UserPrincipalName svc-ldap@lab.local -Enabled $false -PasswordNeverExpires $true -Path 'OU=labUsers,DC=lab,DC=local'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Set a password for this account, and then enable it. You will be prompted to specify a password that complies with your AD domain’s complexity requirements:
PS C:\> Set-ADAccountPassword svc-ldap -PassThru | Enable-ADAccount
PS C:\> Set-ADAccountPassword svc-ldap -PassThru | Enable-ADAccount
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a group for OpenStack users, called
grp-openstack
.PS C:\> NEW-ADGroup -name "grp-openstack" -groupscope Global -path "OU=labUsers,DC=lab,DC=local"
PS C:\> NEW-ADGroup -name "grp-openstack" -groupscope Global -path "OU=labUsers,DC=lab,DC=local"
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the Project groups:
PS C:\> NEW-ADGroup -name "grp-openstack-demo" -groupscope Global -path "OU=labUsers,DC=lab,DC=local" PS C:\> NEW-ADGroup -name "grp-openstack-admin" -groupscope Global -path "OU=labUsers,DC=lab,DC=local"
PS C:\> NEW-ADGroup -name "grp-openstack-demo" -groupscope Global -path "OU=labUsers,DC=lab,DC=local" PS C:\> NEW-ADGroup -name "grp-openstack-admin" -groupscope Global -path "OU=labUsers,DC=lab,DC=local"
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add the
svc-ldap
user to thegrp-openstack
group:PS C:\> ADD-ADGroupMember "grp-openstack" -members "svc-ldap"
PS C:\> ADD-ADGroupMember "grp-openstack" -members "svc-ldap"
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
From an AD Domain Controller, use a
Certificates MMC
to export your LDAPS certificate’s public key (not the private key) as a DER-encodedx509
.cer file. Send this file to the OpenStack administrators. Retrieve the NetBIOS name of your AD DS domain.
PS C:\> Get-ADDomain | select NetBIOSName NetBIOSName ----------- LAB
PS C:\> Get-ADDomain | select NetBIOSName NetBIOSName ----------- LAB
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Send this value to the OpenStack administrators.
1.7. Configure the LDAPS certificate Copiar o linkLink copiado para a área de transferência!
Keystone uses LDAPS queries to validate user accounts. To encrypt this traffic, keystone uses the certificate file defined by keystone.conf
. This procedure converts the public key received from Active Directory into the .crt
format, and copies to a location where keystone will be able to reference it.
Copy the LDAPS public key to the node running OpenStack Identity (keystone), and convert the
.cer
to.crt
. This example uses a source certificate file namedaddc.lab.local.cer
:openssl x509 -outform der -in addc.lab.local.pem -out addc.lab.local.crt cp addc.lab.local.crt /etc/ssl/certs/
# openssl x509 -outform der -in addc.lab.local.pem -out addc.lab.local.crt # cp addc.lab.local.crt /etc/ssl/certs/
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Optionally, if you need to run diagnostic commands, such as ldapsearch
, you will also need to add the certificate to the RHEL certificate store:
Convert the
.cer
to.pem
. This example uses a source certificate file namedaddc.lab.local.cer
:openssl x509 -inform der -in addc.lab.local.cer -out addc.lab.local.pem
# openssl x509 -inform der -in addc.lab.local.cer -out addc.lab.local.pem
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Install the
.pem
on your OpenStack controller. For example, in Red Hat Enterprise Linux:cp addc.lab.local.pem /etc/pki/ca-trust/source/anchors/ update-ca-trust
# cp addc.lab.local.pem /etc/pki/ca-trust/source/anchors/ # update-ca-trust
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.8. Configure Identity Service Copiar o linkLink copiado para a área de transferência!
These steps prepare Identity Service (keystone) for integration with AD DS.
If you are using Red Hat OpenStack Platform director, then you will need to be aware that some of configuration files referenced below are managed by Puppet. Consequently, any custom configuration you add might be overwritten whenever you run the openstack overcloud deploy
process. To apply these settings to director-based deployments, see https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/12/html/integrate_with_identity_service/sec-director-ldap
1.8.1. Enable command line access to keystone v3 Copiar o linkLink copiado para a área de transferência!
To manage Identity Service domains from the command line, you need to enable access to keystone v3.
Perform this procedure from the controller running the keystone service.
Create a copy of the existing environment variable file. In a director-based deployment, it will be called
overcloudrc
:cp overcloudrc overcloudrc-v3
$ cp overcloudrc overcloudrc-v3
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Edit the new
overcloudrc-v3
file:Change
OS_AUTH_URL
from v2.0 to v3. For example:export OS_AUTH_URL=https://controllerIP:5000/v3/
export OS_AUTH_URL=https://controllerIP:5000/v3/
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add the following entries to the bottom of
overcloudrc-v3
:export OS_IDENTITY_API_VERSION=3 export OS_PROJECT_DOMAIN_NAME=Default export OS_USER_DOMAIN_NAME=Default
export OS_IDENTITY_API_VERSION=3 export OS_PROJECT_DOMAIN_NAME=Default export OS_USER_DOMAIN_NAME=Default
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Enable these options for your current command line session by sourcing the file:
source overcloudrc-v3
$ source overcloudrc-v3
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.8.2. Configure the controller Copiar o linkLink copiado para a área de transferência!
If you intend to update any configuration files, you need to be aware that certain OpenStack services now run within containers; this applies to keystone, nova, and cinder, among others. As a result, there are certain administration practices to consider:
-
Do not update any configuration file you might find on the physical node’s host operating system, for example,
/etc/cinder/cinder.conf
. This is because the containerized service does not reference this file. Do not update the configuration file running within the container. This is because any changes are lost once you restart the container.
Instead, if you need to add any changes to containerized services, you will need to update the configuration file that is used to generate the container. These are stored within
/var/lib/config-data/puppet-generated/
For example:
-
keystone:
/var/lib/config-data/puppet-generated/keystone/etc/keystone/keystone.conf
-
cinder:
/var/lib/config-data/puppet-generated/cinder/etc/cinder/cinder.conf
nova:
/var/lib/config-data/puppet-generated/nova/etc/nova/nova.conf
Any changes will then be applied once you restart the container. For example:
sudo docker exec -it keystone pkill -HUP -f keystone
Perform this procedure from the controller running the keystone service. If running a HA environment with multiple controllers, then these steps must be performed on each controller:
Configure SELinux:
setsebool -P authlogin_nsswitch_use_ldap=on
# setsebool -P authlogin_nsswitch_use_ldap=on
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The output might include messages similar to this. They can be ignored:
Full path required for exclude: net:[4026532245].
Full path required for exclude: net:[4026532245].
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the
domains
directory:mkdir /var/lib/config-data/puppet-generated/keystone/etc/keystone/domains/ chown 42425:42425 /var/lib/config-data/puppet-generated/keystone/etc/keystone/domains/
# mkdir /var/lib/config-data/puppet-generated/keystone/etc/keystone/domains/ # chown 42425:42425 /var/lib/config-data/puppet-generated/keystone/etc/keystone/domains/
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Configure keystone to use multiple back ends:
NoteYou might need to install
crudini
usingyum install crudini
.crudini --set /var/lib/config-data/puppet-generated/keystone/etc/keystone/keystone.conf identity domain_specific_drivers_enabled true crudini --set /var/lib/config-data/puppet-generated/keystone/etc/keystone/keystone.conf identity domain_config_dir /etc/keystone/domains crudini --set /var/lib/config-data/puppet-generated/keystone/etc/keystone/keystone.conf assignment driver sql
# crudini --set /var/lib/config-data/puppet-generated/keystone/etc/keystone/keystone.conf identity domain_specific_drivers_enabled true # crudini --set /var/lib/config-data/puppet-generated/keystone/etc/keystone/keystone.conf identity domain_config_dir /etc/keystone/domains # crudini --set /var/lib/config-data/puppet-generated/keystone/etc/keystone/keystone.conf assignment driver sql
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf you are using Red Hat OpenStack Platform director, then you will need to be aware that
/var/lib/config-data/puppet-generated/keystone/etc/keystone/keystone.conf
is managed by Puppet. Consequently, any custom configuration you add might be overwritten whenever you run theopenstack overcloud deploy
process. As a result, you might need to re-add this configuration manually each time. For director-based deployments, see https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/12/html/integrate_with_identity_service/sec-director-ldapEnable multiple domains in dashboard. Add these lines to
/etc/openstack-dashboard/local_settings
:OPENSTACK_API_VERSIONS = { "identity": 3 } OPENSTACK_KEYSTONE_MULTIDOMAIN_SUPPORT = True OPENSTACK_KEYSTONE_DEFAULT_DOMAIN = 'Default'
OPENSTACK_API_VERSIONS = { "identity": 3 } OPENSTACK_KEYSTONE_MULTIDOMAIN_SUPPORT = True OPENSTACK_KEYSTONE_DEFAULT_DOMAIN = 'Default'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf you are using Red Hat OpenStack Platform director, then you will need to be aware that
/etc/openstack-dashboard/local_settings
is managed by Puppet. Consequently, any custom configuration you add might be overwritten whenever you run theopenstack overcloud deploy
process. As a result, you might need to re-add this configuration manually each time. It is expected that a future release of director will include the Puppet parameters that will allow you to re-apply these settings automatically using a post-deployment script.Restart
httpd
to apply the settings:systemctl restart httpd
# systemctl restart httpd
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Configure an additional back end:
In this example,
LAB
is the NetBIOS name to use as the Identity Service domain.Create the keystone domain for AD DS integration.
Use the NetBIOS name value retrieved previously as the domain name. This approach allows you to present a consistent domain name to users during the login process. For example, if the NetBIOS name is
LAB
:openstack domain create LAB
# openstack domain create LAB
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf this command is not available, check that you have enabled keystone v3 for your command line session by running
# source overcloudrc-v3
.Create the configuration file:
To add the AD DS back end, enter the LDAP settings in a new file called
/var/lib/config-data/puppet-generated/keystone/etc/keystone/domains/keystone.LAB.conf
(whereLAB
is the NetBIOS name retrieved previously). You will need to edit the sample settings below to suit your AD DS deployment:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Explanation of each setting:
Expand Setting Description url
The AD Domain Controller to use for authentication. Uses LDAPS port
636
.user
The Distinguished Name of an AD account to use for LDAP queries. For example, you can locate the Distinguished Name value of the svc-ldap account in AD using
Get-ADuser svc-ldap | select DistinguishedName
password
The plaintext password of the AD account used above.
suffix
The Distinguished Name of your AD domain. You can locate this value using
Get-ADDomain | select DistinguishedName
user_tree_dn
The Organizational Unit (OU) that contains the OpenStack accounts.
user_objectclass
Defines the type of LDAP user. For AD, use the
person
type.user_filter
Filters the users presented to Identity Service. As a result, only members of the grp-openstack group can have permissions defined in Identity Service. This value requires the full Distinguished Name of the group:
Get-ADGroup grp-openstack | select DistinguishedName
user_id_attribute
Maps the AD value to use for user IDs.
user_name_attribute
Maps the AD value to use for names.
user_mail_attribute
Maps the AD value to use for user email addresses.
user_pass_attribute
Leave this value blank.
user_enabled_attribute
The AD setting that validates whether the account is enabled.
user_enabled_mask
Defines the value to check to determine whether an account is enabled. Used when booleans are not returned.
user_enabled_default
The AD value that indicates that an account is enabled.
user_attribute_ignore
Defines user attributes that Identity Service should disregard.
user_allow_create
Set this value to
False
, as keystone only requires read-only access.user_allow_update
Set this value to
False
, as keystone only requires read-only access.user_allow_delete
Set this value to
False
, as keystone only requires read-only access.group_objectclass
Maps the AD value to use for groups.
group_tree_dn
The Organizational Unit (OU) that contains the user groups.
group_filter
Filters the groups presented to Identity Service.
group_id_attribute
Maps the AD value to use for group IDs.
group_name_attribute
Maps the AD value to use for group names.
group_allow_create
Set this value to
False
, as keystone only requires read-only access.group_allow_update
Set this value to
False
, as keystone only requires read-only access.group_allow_delete
Set this value to
False
, as keystone only requires read-only access.use_tls
Defines whether TLS is to be used. This needs to be disabled if you are encrypting with LDAPS rather than STARTTLS.
tls_cacertfile
Specifies the path to the .crt certificate file.
query_scope
Configures Identity Service to also search within nested child OUs, when locating users that are members of the
grp-openstack
group.chase_referrals
Set to
false
, this setting preventspython-ldap
from chasing all referrals with anonymous access.
Change ownership of the configuration file to the keystone user:
chown 42425:42425 /var/lib/config-data/puppet-generated/keystone/etc/keystone/domains/keystone.LAB.conf
# chown 42425:42425 /var/lib/config-data/puppet-generated/keystone/etc/keystone/domains/keystone.LAB.conf
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Restart the keystone service to apply the changes:
sudo docker exec -it keystone pkill -HUP -f keystone
# sudo docker exec -it keystone pkill -HUP -f keystone
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Grant the
admin
user access to the domain:NoteThis does not grant the OpenStack admin account any permissions on the actual AD DS domain. In this case, the term domain refers to OpenStack’s usage of the keystone domain.
Get the
ID
of theLAB
domain:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Get the
ID
value of the admin user:openstack user list --domain default | grep admin
# openstack user list --domain default | grep admin | 3d75388d351846c6a880e53b2508172a | admin |
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Get the
ID
value of the admin role:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Use the returned domain and admin IDs to construct the command that adds the
admin
user to theadmin
role of the keystoneLAB
domain:openstack role add --domain 6800b0496429431ab1c4efbb3fe810d4 --user 3d75388d351846c6a880e53b2508172a 785c70b150ee4c778fe4de088070b4cf
# openstack role add --domain 6800b0496429431ab1c4efbb3fe810d4 --user 3d75388d351846c6a880e53b2508172a 785c70b150ee4c778fe4de088070b4cf
Copy to Clipboard Copied! Toggle word wrap Toggle overflow View the list of users in the AD DS domain by adding the NetBIOS name to the command:
NoteIt might take some time for the LDAP to become queryable after a reboot or service restart.
openstack user list --domain LAB
# openstack user list --domain LAB
Copy to Clipboard Copied! Toggle word wrap Toggle overflow View the service accounts in the local Identity Service database:
openstack user list --domain default
# openstack user list --domain default
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.8.3. Configure Compute to use keystone v3 Copiar o linkLink copiado para a área de transferência!
Compute uses keystone v2.0 by default, and so needs to be configured to use keystone v3 in order to use multi-domain capabilities.
On each Compute node, and the controller, adjust the
keystone_authtoken
value:On the Compute nodes:
crudini --set /var/lib/config-data/puppet-generated/nova_libvirt/etc/nova/nova.conf keystone_authtoken auth_version v3
# crudini --set /var/lib/config-data/puppet-generated/nova_libvirt/etc/nova/nova.conf keystone_authtoken auth_version v3
Copy to Clipboard Copied! Toggle word wrap Toggle overflow On the controller:
crudini --set /var/lib/config-data/puppet-generated/nova/etc/nova/nova.conf keystone_authtoken auth_version v3
# crudini --set /var/lib/config-data/puppet-generated/nova/etc/nova/nova.conf keystone_authtoken auth_version v3
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Restart these services on the controller to apply the changes:
systemctl restart openstack-nova-api.service openstack-nova-cert.service openstack-nova-conductor.service openstack-nova-consoleauth.service openstack-nova-novncproxy.service openstack-nova-scheduler.service sudo docker exec -it keystone pkill -HUP -f keystone
# systemctl restart openstack-nova-api.service openstack-nova-cert.service openstack-nova-conductor.service openstack-nova-consoleauth.service openstack-nova-novncproxy.service openstack-nova-scheduler.service # sudo docker exec -it keystone pkill -HUP -f keystone
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Restart these services on each Compute node to apply the changes:
systemctl restart openstack-nova-compute.service
# systemctl restart openstack-nova-compute.service
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.8.4. Configure Block Storage to use keystone v3 Copiar o linkLink copiado para a área de transferência!
You must also configure Block Storage (cinder) to authenticate to keystone v3.
In /etc/cinder/cinder.conf:
[keystone_authtoken] auth_uri = https://controllerIP:5000/v3 auth_version = v3
[keystone_authtoken] auth_uri = https://controllerIP:5000/v3 auth_version = v3
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
auth_uri
- replacecontrollerIP
with the IP address of the controller. If your deployment has more than one controller, you should use the keystone endpoint VIP instead of the controller IP.
-
Restart
cinder-api
on all controllers:systemctl restart openstack-cinder-api
# systemctl restart openstack-cinder-api
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Restart
cinder-scheduler
on all controllers:systemctl restart openstack-cinder-scheduler
# systemctl restart openstack-cinder-scheduler
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Restart
cinder-volume
(on one controller only):pcs resource restart openstack-cinder-volume
# pcs resource restart openstack-cinder-volume
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.8.5. Allow Active Directory group members to access Projects Copiar o linkLink copiado para a área de transferência!
To allow authenticated users access to OpenStack resources, the recommended method is to authorize certain Active Directory groups to grant access to Projects. This saves the OpenStack administrators from having to allocate each user to a role in a Project. Instead, the Active Directory groups are granted roles in Projects. As a result, Active Directory users that are members of these Active Directory groups will be able to access pre-determined Projects.
If you would prefer to manually manage the authorization of individual Active Directory users, see the following section: Allow individual Active Directory users to access Projects
This section presumes that the Active Directory administrator has already completed these steps:
-
Create a group named
grp-openstack-admin
in Active Directory. -
Create a group named
grp-openstack-demo
in Active Directory. - Add your Active Directory users to one of the above groups, as needed.
-
Add your Active Directory users to the
grp-openstack
group.
These steps assign a role to an AD group. Group members will then have permission to access OpenStack resources.
Retrieve a list of AD groups:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Retrieve a list of roles:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Grant the Active Directory groups access to Projects by adding them to one or more of these roles. For example, if you want users in the
grp-openstack-demo
group to be general users of thedemo
project, you must add the group to the_member_
role:openstack role add --project demo --group d971bb3bd5e64a454cbd0cc7af4c0773e78d61b5f81321809f8323216938cae8 _member_
# openstack role add --project demo --group d971bb3bd5e64a454cbd0cc7af4c0773e78d61b5f81321809f8323216938cae8 _member_
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
As a result, members of grp-openstack-demo
are able to log in to the dashboard by entering their AD DS username and password, when also entering LAB
in the Domain field:
If users receive the error Error: Unable to retrieve container list.
, and expect to be able to manage containers, then they must be added to the SwiftOperator
role.
1.8.6. Allow Active Directory users to access Projects Copiar o linkLink copiado para a área de transferência!
AD DS users that are members of the grp-openstack
AD group can be granted permission to log in to a Project in the dashboard:
Retrieve a list of AD users:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Retrieve a list of roles:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Grant users access to Projects by adding them to one or more of these roles. For example, if you want
user1
to be a general user of thedemo
project, you add them to themember
role:openstack role add --project demo --user 1f24ec1f11aeb90520079c29f70afa060d22e2ce92b2eba7784c841ac418091e _member_
# openstack role add --project demo --user 1f24ec1f11aeb90520079c29f70afa060d22e2ce92b2eba7784c841ac418091e _member_
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Or, if you want
user1
to be an administrative user of thedemo
project, you add them to theadmin
role:openstack role add --project demo --user 1f24ec1f11aeb90520079c29f70afa060d22e2ce92b2eba7784c841ac418091e admin
# openstack role add --project demo --user 1f24ec1f11aeb90520079c29f70afa060d22e2ce92b2eba7784c841ac418091e admin
Copy to Clipboard Copied! Toggle word wrap Toggle overflow As a result,
user1
is able to log in to the dashboard by entering their AD DS username and password, when also enteringLAB
in theDomain
field:
If users receive the error Error: Unable to retrieve container list.
, and expect to be able to manage containers, then they must be added to the SwiftOperator
role.
1.9. Grant access to the Domain tab Copiar o linkLink copiado para a área de transferência!
To allow the admin
user to see the Domain
tab, you will need to assign it the admin
role in the default
domain:
Find the
admin
user’s UUID:openstack user list | grep admin
$ openstack user list | grep admin | a6a8adb6356f4a879f079485dad1321b | admin |
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Add the
admin
role in thedefault
domain to theadmin
user:openstack role add --domain default --user a6a8adb6356f4a879f079485dad1321b admin
$ openstack role add --domain default --user a6a8adb6356f4a879f079485dad1321b admin
Copy to Clipboard Copied! Toggle word wrap Toggle overflow As a result, the
admin
user can now see theDomain
tab.
1.10. Creating a new project Copiar o linkLink copiado para a área de transferência!
After you have completed these integration steps, when you create a new project you will need to decide whether to create it in the Default
domain, or in the keystone domain you’ve just created. This decision can be reached by considering your workflow, and how you administer user accounts. The Default domain can be be thought of as an internal domain, used to manage service accounts and the admin project. For separation purposes, you might want to keep your AD-backed users in a separate keystone domain.
1.11. Changes to the dashboard log in process Copiar o linkLink copiado para a área de transferência!
Configuring multiple domains in Identity Service enables a new Domain field in the dashboard login page.
Users are expected to enter the domain that matches their login credentials. This field must be manually filled with one of the domains present in keystone. Use the openstack command to list the available entries.
In this example, AD DS accounts will need to specify the LAB
domain. The built-in keystone accounts, such as admin, must specify Default
as their domain:
1.12. Changes to the command line Copiar o linkLink copiado para a área de transferência!
For certain commands, you might need to specify the applicable domain. For example, appending --domain LAB
in this command returns users in the LAB domain (that are members of the grp-openstack group):
openstack user list --domain LAB
# openstack user list --domain LAB
Appending --domain Default
returns the built-in keystone accounts:
openstack user list --domain Default
# openstack user list --domain Default
1.13. Test AD DS integration Copiar o linkLink copiado para a área de transferência!
This procedure validates AD DS integration by testing user access to dashboard features:
-
Create a test user in AD, and add the user to the
grp-openstack
AD DS group. -
Add the user to the
_member_
role of thedemo
tenant. - Log in to the dashboard using the credentials of the AD test user.
- Click on each of the tabs to confirm that they are presented successfully without error messages.
- Use the dashboard to build a test instance.
If you experience issues with these steps, perform steps 3-5 with the built-in admin account. If successful, this demonstrates that OpenStack is still working as expected, and that an issue exists somewhere within the AD ←→ Identity integration settings. See Section 1.16, “Troubleshooting”.
1.14. Configure high availability Copiar o linkLink copiado para a área de transferência!
With keystone v3 enabled, you can make this configuration highly available by listing multiple AD Domain Controllers in the configuration file for that domain.
Add a second server to the
url
entry. For example, updating theurl
setting in thekeystone.LAB.conf
file will have keystone send all query traffic to the first Domain Controller in the list,addc.lab.local
:url = ldaps://addc.lab.local,ldaps://addc2.lab.local
url = ldaps://addc.lab.local,ldaps://addc2.lab.local
Copy to Clipboard Copied! Toggle word wrap Toggle overflow If a query to addc.lab.local fails due to it being unavailable, Identity Service will attempt to query the next server in the list:
addc2.lab.local
. Note that this configuration does not perform queries in a round-robin fashion, so cannot be considered a load-balancing solution.Set the network timeout in
/etc/openldap/ldap.conf
:NETWORK_TIMEOUT 2
NETWORK_TIMEOUT 2
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
In addition, if you have firewalls configured between the controller and the domain controllers, then you should not configure the domain controllers to silently drop packets from the controller. This will allow python-keystoneclient
to properly detect outages and redirect the request to the next domain controller in the list.
There might be connection delays while queries are being redirected to the second LDAP server in the list. This is because the connection to the first server must first time out before the second is attempted.
1.15. Create a RC file for a non-admin user Copiar o linkLink copiado para a área de transferência!
You might need to create a RC file for a non-admin user. For example:
1.16. Troubleshooting Copiar o linkLink copiado para a área de transferência!
1.16.1. Test LDAP connections Copiar o linkLink copiado para a área de transferência!
This command expects to find the necessary certificate in your host operating system. See the Configure the LDAPS certificate section for more information.
Use ldapsearch
to remotely perform test queries against the Active Directory Domain Controller. A successful result here indicates that network connectivity is working, and the AD DS services are up. In this example, a test query is performed against the server addc.lab.local
on port 636
:
ldapsearch -Z -x -H ldaps://addc.lab.local:636 -D "svc-ldap@lab.local" -W -b "OU=labUsers,DC=lab,DC=local" -s sub "(cn=*)" cn
# ldapsearch -Z -x -H ldaps://addc.lab.local:636 -D "svc-ldap@lab.local" -W -b "OU=labUsers,DC=lab,DC=local" -s sub "(cn=*)" cn
ldapsearch
is a part of the openldap-clients
package. You can install this using # yum install openldap-clients
1.16.2. Test the Certificate Trust Configuration Copiar o linkLink copiado para a área de transferência!
If you receive the error Peer's Certificate issuer is not recognized.
while testing with ldapsearch, confirm that your TLS_CACERTDIR
path is correctly set. For example:
- /etc/openldap/ldap.conf
TLS_CACERTDIR /etc/openldap/certs
TLS_CACERTDIR /etc/openldap/certs
As a temporary workaround, you may want to consider disabling certificate validation.
This setting must not be permanently configured:
-
/etc/openldap/ldap.conf
TLS_REQCERT allow
TLS_REQCERT allow
If the ldapsearch
query works after setting this value, you might need to review whether your certificate trusts are correctly configured.
1.16.3. Test port access Copiar o linkLink copiado para a área de transferência!
Use nc
to check that LDAPS port 636
is remotely accessible. In this example, a probe is performed against the server addc.lab.local
. Press ctrl-c to exit the prompt.
nc -v addc.lab.local 636
# nc -v addc.lab.local 636
Ncat: Version 6.40 ( http://nmap.org/ncat )
Ncat: Connected to 192.168.200.10:636.
^C
Failure to establish a connection could indicate a firewall configuration issue.