RFE: Create a role for domain-scoped self-service identity management by end users

Bug #2045974 reported by Markus Hentsch
26
This bug affects 6 people
Affects Status Importance Assigned to Milestone
OpenStack Identity (keystone)
Fix Released
Wishlist
Unassigned

Bug Description

When assigning individual domains to customers of an OpenStack cloud, customer-side self-service identity management (i.e. managing users, projects and groups) within a domain is a popular use case but hard to implement with the current default role model.

With its current architecture, assigning the "admin" role to end users is very risky even if scoped [1] and usually not an option.
Furthermore, the "admin" role already has an implicit meaning associated with it that goes beyond identity management according to operator feedback [2].

The Consistent and Secure RBAC rework introduced a "manager" role for projects [3].
Having a similar role model on domain-level for identity management would be a good complement to that and enable self-service capabilities for end users.

Request: introduce a new "domain-manager" role in Keystone and associated policy rules.
The new "domain-manager" role - once assigned to an end user in a domain scope - would enable them to manage projects, groups, users and associated role assignments within the limitations of the domain.

[1] https://bugs.launchpad.net/keystone/+bug/968696

[2] https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#the-issues-we-are-facing-with-scope-concept

[3] https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#project-manager

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to keystone-specs (master)
Changed in keystone:
status: New → In Progress
David Wilde (dave-wilde)
Changed in keystone:
importance: Undecided → Wishlist
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to keystone-specs (master)

Reviewed: https://review.opendev.org/c/openstack/keystone-specs/+/903172
Committed: https://opendev.org/openstack/keystone-specs/commit/2bf1a07a710e1443596a4151bfcbad5d9cef6c62
Submitter: "Zuul (22348)"
Branch: master

commit 2bf1a07a710e1443596a4151bfcbad5d9cef6c62
Author: Markus Hentsch <email address hidden>
Date: Tue May 28 11:26:08 2024 +0200

    Add identity spec for Domain Manager persona

    Adds domain-scoped identity management
    functionality for the existing "manager"
    role via policy adjustments.

    Partial-Bug: #2045974
    Co-Authored-By: Josephine Seifert <email address hidden>
    Change-Id: I787972e560f70fc56a99c44198e509222fe5ad16

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to keystone (master)

Fix proposed to branch: master
Review: https://review.opendev.org/c/openstack/keystone/+/924132

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to keystone (master)

Reviewed: https://review.opendev.org/c/openstack/keystone/+/924132
Committed: https://opendev.org/openstack/keystone/commit/69d1897d0974aafc5f41b851ce61f62ab879c805
Submitter: "Zuul (22348)"
Branch: master

commit 69d1897d0974aafc5f41b851ce61f62ab879c805
Author: Markus Hentsch <email address hidden>
Date: Mon Jul 15 11:09:55 2024 +0200

    Implement the Domain Manager Persona for Keystone

    Introduces domain-scoped policies for the 'manager' role to permit
    domain-wide management capabilities in regards to users, groups,
    projects and role assignments.
    Defines a new base policy rule to restrict the roles assignable by
    domain managers.

    Closes-Bug: #2045974
    Change-Id: I62742ed7d906c92d1132251080758bb54d0fc8e1

Changed in keystone:
status: In Progress → Fix Released
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix included in openstack/keystone 26.0.0.0rc1

This issue was fixed in the openstack/keystone 26.0.0.0rc1 release candidate.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.