yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #79313
[Bug 1813057] Re: The tokenless/x509 authentication documentation is opaque
Reviewed: https://review.opendev.org/669790
Committed: https://git.openstack.org/cgit/openstack/keystone/commit/?id=4fb4d8b8a4055dfacf13a409e590485461d766b2
Submitter: Zuul
Branch: master
commit 4fb4d8b8a4055dfacf13a409e590485461d766b2
Author: Guang Yee <guang.yee@xxxxxxxx>
Date: Mon Jul 8 21:55:47 2019 -0700
update documentation for X.509 tokenless auth
Explain what this feature is intended for and how to properly
use it.
Change-Id: I5ef67d9beaa0fc9505270408db4dec5dd9d97ebf
Closes-Bug: 1813057
** Changed in: keystone
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1813057
Title:
The tokenless/x509 authentication documentation is opaque
Status in OpenStack Identity (keystone):
Fix Released
Bug description:
Keystone supports the ability to trust a certificate authority,
meaning it also has the ability to trust certificates issued to users
by that authority. The work originally landed in Liberty [0], but some
of the examples in the documentation could be more concise [1].
Some things we could do to improve this documentation would be to:
- Explain situations where trusting a CA would be beneficial to a deployment
- Explain how operators should know what to configure for the trusted_issuer (e.g., this should ideally be an openssl command they can use to pull the value out of their certificate - the current documentation doesn't really tell you how to get this, leaving you guessing)
- Put the configuration steps into the configuration guide, which is written for operators setting up and configuring their deployment
- Put the user information in the user guide, so it's easier for users to know how they can use a certificate given to them from an operator
[0] https://specs.openstack.org/openstack/keystone-specs/specs/liberty/keystone-tokenless-authz-with-x509-ssl-client-cert.html
[1] https://docs.openstack.org/keystone/latest/admin/configure_tokenless_x509.html#create-an-identity-provider-idp
To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1813057/+subscriptions
References