[RFE][keystone][idm/ldap backend]: is it possible to use nested group to authorize users ?

Bug #1834304 reported by Rohit Londhe
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
OpenStack Identity (keystone)
Expired
Undecided
Unassigned

Bug Description

Hello,

Keystone is interfaced with an LDAP backend (IDM) using a specific domain to authenticate/authorize users to access openstack APIs. We assign a role to a specific group to a specific project. In order to simplify IDM configuration, I would like to use nested group but I do not manage to configure it. I am not even sure it is possible.

In general/standard configuration keystone is looking up for groups with a direct membship for the user. When we use nested group, as the user is not a direct member it does not work.

Is there any option in keystone ldap configuration that could make keystone used "memberOf" attributes of the user (instead of the group_member_attribute) to determine the group membership.

Or Are there plans to get this added a feature in OpenStack?

Tags: ldap
Revision history for this message
Colleen Murphy (krinkle) wrote :

Have you tried turning on the group_ad_nesting option? I am not sure whether the AD implementation maps to the IdM implementation at all, but the idea seems similar. If that doesn't work, we could probably implement a similar option specific to IdM.

Changed in keystone:
status: New → Incomplete
Revision history for this message
Guang Yee (guang-yee) wrote :

Can you please provide a specific example on what your group structure looks like in LDAP and the expected outcome?

Revision history for this message
Launchpad Janitor (janitor) wrote :

[Expired for OpenStack Identity (keystone) because there has been no activity for 60 days.]

Changed in keystone:
status: Incomplete → Expired
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.