• Complain

Steve Martinelli - Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone

Here you can read online Steve Martinelli - Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2016, publisher: OReilly Media, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Steve Martinelli Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone
  • Book:
    Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone
  • Author:
  • Publisher:
    OReilly Media
  • Genre:
  • Year:
    2016
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

KeystoneOpenStacks Identity serviceprovides secure controlled access to a clouds resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.

Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layeras well as key practices for safeguarding your clouds ongoing security.

  • Learn about Keystones fundamental capabilities for providing Identity, Authentication, and Access Management
  • Perform basic Keystone operations, using concrete examples and the latest version (v3) of Keystones Identity API
  • Understand Keystones unique support for multiple token formats, including how it has evolved over time
  • Get an in-depth explanation of Keystones LDAP support and how to configure Keystone to integrate with LDAP
  • Learn about one of Keystones most sought-after featuressupport for federated identity

Steve Martinelli: author's other books


Who wrote Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone? Find out the surname, the name of the author of the book and a list of all author's works by series.

Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Identity, Authentication, and Access Management in OpenStack

by Steve Martinelli , Henry Nash , and Brad Topol

Copyright 2016 Steve Martinelli, Henry Nash, and Brad Topol. All rights reserved.

Printed in the United States of America.

Published by OReilly Media, Inc. , 1005 Gravenstein Highway North, Sebastopol, CA 95472.

OReilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safaribooksonline.com). For more information, contact our corporate/institutional sales department: 800-998-9938 or corporate@oreilly.com .

  • Acquisitions Editor: Rachel Roumeliotis
  • Editor: Nan Barber
  • Production Editor: Dan Fauxsmith
  • Proofreader: Christina Edwards
  • Indexer: WordCo Indexing Services, Inc.
  • Interior Designer: David Futato
  • Cover Designer: Ellie Volckhausen
  • Illustrator: Rebecca Demarest
  • October 2015: First Edition
Revision History for the First Edition
  • 2015-09-28: First Release
  • 2015-12-07: Second Release

See http://oreilly.com/catalog/errata.csp?isbn=9781449370787 for release details.

The OReilly logo is a registered trademark of OReilly Media, Inc. Identity, Authentication, and Access Management in OpenStack, the cover image, and related trade dress are trademarks of OReilly Media, Inc.

While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the authors disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights.

978-1-491-94120-1

[LSI]

Dedication

To Dini, for your never-ending support and love, and to my parents and grandfather for their patience, selflessness and unwavering support.

Steve Martinelli

To my wife Susan, for her incredible love and support (and for putting up with a steady stream of my crazy ideas over the years), and to everyone who strives to disrupt the status quo with new ways of thinking. Remember, if it was easy, someone else would have already done it.

Henry Nash

I dedicate this book to my wife Janet, my daughter Morgan, and my son Ryan. I could not have done this without your love and support during this process.

Brad Topol

Preface
Prologue

A key aspect to setting up a cloud, whether it be private, public, or dedicated, is ensuring that access to cloud resources and security are in place. For OpenStack environments, the focal point for securing the cloud is Keystone, OpenStacks Identity service. Keystone provides many key functions, such as authenticating users and determining what resources users are authorized to access.

Keystone started from humble beginnings. In the early days, it provided basic user management and constructs for organized access to resources. As enterprise customers became more interested in OpenStack, it became readily apparent that Keystone needed significant enhancements to meet the demanding needs of enterprise customers before it would be adopted in the enterprise.

Early enterprise requirements were focused on improving Keystones Lightweight Directory Access Protocol (LDAP) and Microsofts Active Directory support. Enterprise customers want to reuse their existing identity-management tools and dont want a separate new identity tool to manage their OpenStack users. Support was added to ensure Keystone could reuse existing LDAPs and Active Directories that were read only and only contained user and group information. Next, secure connections were added so Keystone could connect to LDAP and Active Directories over a TLS connection.

This basic support for ease of integration with existing enterprise identity managers helped OpenStack to distinguish itself from competing cloud infrastructures. It then led to a second phase of advanced enterprise integration where customers demanded support for integration with multiple LDAPs and Active Directories. This feature was critical for large enterprises that, through means such as acquisitions, had multiple identity servers they needed to support. Also as part of this phase, customers started requesting true federated identity support whereby they expected Keystone to integrate with federated identity-management tools that supported well-known and standard identity protocols such as the Security Assertion Markup Language (SAML) and OpenID Connect. Around this time Keystone started to add audit support to better enable it to meet the compliance requirements of many enterprise customers.

With the foundations of federated support, Keystone has moved to its current phase, focusing on federated support for hybrid clouds. With this federation support foundation in place, multiple Keystones can work together using standard federated protocols to support interoperable hybrid clouds. In this book, we describe all of these enhancements. We begin by providing an overview of how to perform basic Keystone operations, and we provide concrete examples using the latest version (v3) of the Keystone Identity API. We then cover Keystones support for multiple token formats and describe how its preferred token formats have evolved over time. After we discuss these fundamentals, we move on to advanced topics of LDAP integration and federation. We conclude with a discussion on topics of future work for Keystone.

Conventions Used in This Book

The following typographical conventions are used in this book:

Italic

Indicates new terms, URLs, email addresses, filenames, and file extensions.

Constant width

Used for program listings, as well as within paragraphs to refer to program elements such as variable or function names, databases, data types, environment variables, statements, and keywords.

Constant width bold

Shows commands or other text that should be typed literally by the user.

Constant width italic

Shows text that should be replaced with user-supplied values or by values determined by context.

Tip

This element signifies a tip or suggestion.

Note

This element signifies a general note.

Warning

This element indicates a warning or caution.

Using Code Examples

This book is here to help you get your job done. In general, if example code is listed in this book, you may use it in your programs and documentation. You do not need to contact us for permission unless youre reproducing a significant portion of the code. For example, writing a program that uses several chunks of code from this book does not require permission. Selling or distributing a CD-ROM of examples from OReilly books does require permission. Answering a question by citing this book and quoting example code does not require permission. Incorporating a significant amount of example code from this book into your products documentation does require permission.

We appreciate, but do not require, attribution. An attribution usually includes the title, author, publisher, and ISBN. For example: Identity, Authentication, and Access Management in OpenStack by Steve Martinelli, Henry Nash, and Brad Topol (OReilly). Copyright 2015 Steve Martinelli, Henry Nash, and Brad Topol, 978-1-491-94120-1.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone»

Look at similar books to Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone»

Discussion, reviews of the book Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.