openstack team mailing list archive
-
openstack team
-
Mailing list archive
-
Message #01984
Re: Proposing an Identity Service in OpenStack (a.k.a. Auth)
And here is a launchpad mirror: https://launchpad.net/keystone
<https://launchpad.net/keystone>
On Apr 26, 2011, at 5:25 PM, Ziad Sawalha wrote:
As a follow-up, and to keep the conversation moving, we've built and posted a proof of concept for the OpenStack Identity service at https://github.com/khussein/keystone/. The code includes a rudimentary token-based authentication implementation.
Included in the project (our internal code name for the project is Keystone and we're proposing that as the project name):
1 - Keystone (Identity.py): an identity and token management service with a ReSTful API
2 - Echo: a sample service that echoes back requests
3 - Two middleware components:
- one to install with the echo (or OpenStack) service that verifies incoming requests are authenticated (and redirects them is not)
- another that handles the token validation (this service can be run inline with the echo service or on a separate, remote proxy layer)
This is rough code. And, admittedly, the middleware part is hard to explain (we tried in this blueprint: http://wiki.openstack.org/openstack-authn), but we want to put this out there in the open ASAP for everyone interested to participate.
We are looking for feedback, input, contributions, and good conversations about the path forward. We're at the summit this week and available to explain, demo, hack, discuss, and collaborate with anyone interested.
Reach out to us, we look forward to meeting everyone:
- Ziad Sawalha
- Jorge Williams
- Khaled Hussein
Thanks for everyone who contributed to the code, especially Jesse and Vish for helping us be more pythonic!
Ziad
On Apr 18, 2011, at 10:15 AM, Eric Day wrote:
Looks good! I'm looking forward to the summit discussions. Beyond
pluggable backends, I would make sure other layers remain pluggable
as well (the auth mechanism, protocols to verify, etc). The use cases
I have in mind are:
* All common forms of HTTP auth.
* OpenID, OAuth, and any other open initiatives.
* Signatures (for ec2 compatibility)
* SASL mechamisms?
* AuthN/AuthZ from non-HTTP based protocols. For example the MySQL
protocol for DBaaS requires either plaintext storage of the password
(which we shouldn't do) or a custom hash.
We'll also want to decide if we need a default mechanism for
OpenStack deployments, and if so, what should it be. We had a
discussion previously and I think it was somewhere between token
and HTTP basic w/ SSL. The reason for this is we need to make sure
different deployments are compatible.
-Eric
On Mon, Apr 18, 2011 at 06:42:22AM -0500, Ziad Sawalha wrote:
Hi Everyone,
For OpenStack to achieve the goal of being a "massively scalable cloud
operating system", it needs a common approach to some of the problems that
an "operating system"deals with such as Authentication (auth-n) and
Authorization (auth-z). There has been much discussion on the topic (see
below) so we are proposing we combine all these efforts into a new
OpenStack project that addresses the auth of all other projects.
I would like to raise this for discussion at the upcoming summit in Santa
Clara and put forward the following as a starting point for the
discussion:
SCOPE
The potential scope for an auth service is huge; this is not a simple
problem, especially when you deal with authorization and, eventually,
usage metering. We suggest we start with a minimum viable product (MVP)
and that the most immediate requirements that need to be addressed are
what has already been solved for in Swift and Nova today.
We propose to start building in (1-2 week) iterations during the Diablo
development phase:
* One Service: there should be one auth-n service (this does not presume
or preclude auth-z)
* Service is a new Core service
* Protocol: initial implementation of Rackspace auth token
* Anyscale: single dev machine to globally distributed
* Integrate with Swift, Nova
* Independent: I can run this on its own (no coupling to other services).
Therefore can be installed and run with any services that are OpenStack
compatible.
TIMELINE
Iteration 0 (1-2 weeks): MVP prototype
* blueprint
* We need lightweight delegation (one tenant / multiple users) on validate
(this extends scope of what is in Rackspace and Swift, but is needed for
Nova)
* No delegation beyond existing Nova and Swift implementation
* Using a Token
* Admin is handled by "groups" (roles) - only group allowed to be returned
is ADMIN
* nothing as a Service for testing.
Post MVP: iteration 2/3/...: defined from subset of backlog & feedback
from community
Backlog:
* migration path from cactus
* support for ec2 & openstack api
* zones support
* authz by group/role/attribute/... with pluggable Policy Engine
* Pluggable back-end (ex: database, LDAP, Active Directory, PAM, Swift)
* rbac / roles
* Delegation
* OAuth for solving 3rd party partner problem / federation
* (Generic?) Organizational Model
* user management API
DESIGN SUMMIT
* We are looking forward to starting a discussion with the community on
how to incrementally define and execute on a common Auth system for
OpenStack
ADDITIONAL INFORMATION
For reference, existing blueprints and discussions on the topic are:
SPECS and CODE
http://wiki.openstack.org/AuthnAuthz (spec and discussion)
http://wiki.openstack.org/openstack-authn (spec)
http://bazaar.launchpad.net/~anso/nova/authn_and_authz/revision/770 (auth
service prototype)
https://code.launchpad.net/~khussein/swift/authn (middleware proposal)
SWIFT
https://blueprints.launchpad.net/swift/+spec/swift-authn
https://blueprints.launchpad.net/swift/+spec/bexar-swauth
NOVA
https://blueprints.launchpad.net/nova/+spec/authentication-consistency
https://blueprints.launchpad.net/nova/+spec/nova-authn
GLANCE
https://blueprints.launchpad.net/glance/+spec/authentication
BURROW
https://blueprints.launchpad.net/burrow/+spec/openstack-auth-ldap
Regards,
Ziad
_______________________________________________
Mailing list: https://launchpad.net/~openstack
Post to : openstack@xxxxxxxxxxxxxxxxxxx<mailto:openstack@xxxxxxxxxxxxxxxxxxx>
Unsubscribe : https://launchpad.net/~openstack
More help : https://help.launchpad.net/ListHelp
_______________________________________________
Mailing list: https://launchpad.net/~openstack
Post to : openstack@xxxxxxxxxxxxxxxxxxx<mailto:openstack@xxxxxxxxxxxxxxxxxxx>
Unsubscribe : https://launchpad.net/~openstack
More help : https://help.launchpad.net/ListHelp
References