yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #84042
[Bug 1897593] [NEW] How to restrict adding users in projects from different domains/regions ?
Public bug reported:
Hi Team,
I able to add users or Technical users in projects from different
domains, i dont think this is a default feature ? or is it ? if yes, can
we restrict users from being added from different domains/regions ?
The keystone policy.json is present here https://github.com/sapcc/helm-
charts/blob/master/openstack/keystone/templates/etc/_policy.json.tpl
The command used to add users from different domain is :
openstack role add --project <project_id> --user <user_id> <role_id>
Do we need to harden the policy wrt :
"identity:create_role": "rule:cloud_admin",
or
"identity:update_role": "rule:cloud_admin",
Debug logs show : HTTP PUT is being used:
PUT call to identity for
<AUTH_URL>/v3/projects/<project_id>/users/<user_id>/roles/<role_id> used
Regards,
Rajiv
** Affects: keystone
Importance: Undecided
Status: New
** Tags: api-ref policy
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1897593
Title:
How to restrict adding users in projects from different
domains/regions ?
Status in OpenStack Identity (keystone):
New
Bug description:
Hi Team,
I able to add users or Technical users in projects from different
domains, i dont think this is a default feature ? or is it ? if yes,
can we restrict users from being added from different domains/regions
?
The keystone policy.json is present here https://github.com/sapcc
/helm-
charts/blob/master/openstack/keystone/templates/etc/_policy.json.tpl
The command used to add users from different domain is :
openstack role add --project <project_id> --user <user_id> <role_id>
Do we need to harden the policy wrt :
"identity:create_role": "rule:cloud_admin",
or
"identity:update_role": "rule:cloud_admin",
Debug logs show : HTTP PUT is being used:
PUT call to identity for
<AUTH_URL>/v3/projects/<project_id>/users/<user_id>/roles/<role_id>
used
Regards,
Rajiv
To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1897593/+subscriptions