doc: Move openstack_auth settings to DOA docs
At now, most django_openstack_auth (DOA) settings are documented in the horizon documentation. It is better to have documentation in a same place for better maintenance. This commit drops openstack_auth specific settings from the horizon configuration guide. Also update the wrong name of openstack_auth setting in local_settings.py. The correct name is TOKEN_DELETION_DISABLED. Change-Id: Ia5518278c1bc70bb1b3faf44917094de56f344af
This commit is contained in:
parent
b3cd3e3ccd
commit
6f54390df7
@ -1040,17 +1040,6 @@ If Keystone has been configured to use LDAP as the auth backend then set
|
|||||||
``can_edit_user`` and ``can_edit_project`` to ``False`` and name to ``"ldap"``.
|
``can_edit_user`` and ``can_edit_project`` to ``False`` and name to ``"ldap"``.
|
||||||
|
|
||||||
|
|
||||||
``OPENSTACK_KEYSTONE_DEFAULT_DOMAIN``
|
|
||||||
-------------------------------------
|
|
||||||
|
|
||||||
.. versionadded:: 2013.2(Havana)
|
|
||||||
|
|
||||||
Default: ``"Default"``
|
|
||||||
|
|
||||||
Overrides the default domain used when running on single-domain model
|
|
||||||
with Keystone V3. All entities will be created in the default domain.
|
|
||||||
|
|
||||||
|
|
||||||
``OPENSTACK_KEYSTONE_DEFAULT_ROLE``
|
``OPENSTACK_KEYSTONE_DEFAULT_ROLE``
|
||||||
-----------------------------------
|
-----------------------------------
|
||||||
|
|
||||||
@ -1062,62 +1051,6 @@ The name of the role which will be assigned to a user when added to a project.
|
|||||||
This value must correspond to an existing role name in Keystone. In general,
|
This value must correspond to an existing role name in Keystone. In general,
|
||||||
the value should match the ``member_role_name`` defined in ``keystone.conf``.
|
the value should match the ``member_role_name`` defined in ``keystone.conf``.
|
||||||
|
|
||||||
|
|
||||||
``OPENSTACK_KEYSTONE_ADMIN_ROLES``
|
|
||||||
----------------------------------
|
|
||||||
|
|
||||||
.. versionadded:: 2015.1(Kilo)
|
|
||||||
|
|
||||||
Default: ``["admin"]``
|
|
||||||
|
|
||||||
The list of roles that have administrator privileges in this OpenStack
|
|
||||||
installation. This check is very basic and essentially only works with
|
|
||||||
keystone v2.0 and v3 with the default policy file. The setting assumes there
|
|
||||||
is a common ``admin`` like role(s) across services. Example uses of this
|
|
||||||
setting are:
|
|
||||||
|
|
||||||
* to rename the ``admin`` role to ``cloud-admin``
|
|
||||||
* allowing multiple roles to have administrative privileges, like
|
|
||||||
``["admin", "cloud-admin", "net-op"]``
|
|
||||||
|
|
||||||
|
|
||||||
``OPENSTACK_KEYSTONE_MULTIDOMAIN_SUPPORT``
|
|
||||||
------------------------------------------
|
|
||||||
|
|
||||||
.. versionadded:: 2013.2(Havana)
|
|
||||||
|
|
||||||
Default: ``False``
|
|
||||||
|
|
||||||
Set this to True if running on multi-domain model. When this is enabled, it
|
|
||||||
will require user to enter the Domain name in addition to username for login.
|
|
||||||
|
|
||||||
``OPENSTACK_KEYSTONE_DOMAIN_DROPDOWN``
|
|
||||||
--------------------------------------
|
|
||||||
|
|
||||||
.. versionadded:: 12.0.0(Pike)
|
|
||||||
|
|
||||||
Default: ``False``
|
|
||||||
Set this to True if you want available domains displayed as a dropdown menu on
|
|
||||||
the login screen. It is strongly advised NOT to enable this for public clouds,
|
|
||||||
as advertising enabled domains to unauthenticated customers irresponsibly
|
|
||||||
exposes private information. This should only be used for private clouds where
|
|
||||||
the dashboard sits behind a corporate firewall.
|
|
||||||
|
|
||||||
``OPENSTACK_KEYSTONE_DOMAIN_CHOICES``
|
|
||||||
-------------------------------------
|
|
||||||
|
|
||||||
.. versionadded:: 12.0.0(Pike)
|
|
||||||
|
|
||||||
Default::
|
|
||||||
|
|
||||||
(
|
|
||||||
('Default', 'Default'),
|
|
||||||
)
|
|
||||||
|
|
||||||
If OPENSTACK_KEYSTONE_DOMAIN_DROPDOWN is enabled, this option can be used to
|
|
||||||
set the available domains to choose from. This is a list of pairs whose first
|
|
||||||
value is the domain name and the second is the display name.
|
|
||||||
|
|
||||||
``OPENSTACK_KEYSTONE_URL``
|
``OPENSTACK_KEYSTONE_URL``
|
||||||
--------------------------
|
--------------------------
|
||||||
|
|
||||||
@ -1142,95 +1075,6 @@ Identity Providers (IdPs) and establish a set of rules to map federation protoco
|
|||||||
attributes to Identity API attributes. This extension requires v3.0+ of the
|
attributes to Identity API attributes. This extension requires v3.0+ of the
|
||||||
Identity API.
|
Identity API.
|
||||||
|
|
||||||
|
|
||||||
``WEBSSO_ENABLED``
|
|
||||||
------------------
|
|
||||||
|
|
||||||
.. versionadded:: 2015.1(Kilo)
|
|
||||||
|
|
||||||
Default: ``False``
|
|
||||||
|
|
||||||
Enables keystone web single-sign-on if set to True. For this feature to work,
|
|
||||||
make sure that you are using Keystone V3 and Django OpenStack Auth V1.2.0 or
|
|
||||||
later.
|
|
||||||
|
|
||||||
|
|
||||||
``WEBSSO_INITIAL_CHOICE``
|
|
||||||
-------------------------
|
|
||||||
|
|
||||||
.. versionadded:: 2015.1(Kilo)
|
|
||||||
|
|
||||||
Default: ``"credentials"``
|
|
||||||
|
|
||||||
Determines the default authentication mechanism. When user lands on the login
|
|
||||||
page, this is the first choice they will see.
|
|
||||||
|
|
||||||
|
|
||||||
``WEBSSO_CHOICES``
|
|
||||||
------------------
|
|
||||||
|
|
||||||
.. versionadded:: 2015.1(Kilo)
|
|
||||||
|
|
||||||
Default::
|
|
||||||
|
|
||||||
(
|
|
||||||
("credentials", _("Keystone Credentials")),
|
|
||||||
("oidc", _("OpenID Connect")),
|
|
||||||
("saml2", _("Security Assertion Markup Language"))
|
|
||||||
)
|
|
||||||
|
|
||||||
This is the list of authentication mechanisms available to the user. It
|
|
||||||
includes Keystone federation protocols such as OpenID Connect and SAML, and
|
|
||||||
also keys that map to specific identity provider and federation protocol
|
|
||||||
combinations (as defined in ``WEBSSO_IDP_MAPPING``). The list of choices is
|
|
||||||
completely configurable, so as long as the id remains intact. Do not remove
|
|
||||||
the credentials mechanism unless you are sure. Once removed, even admins will
|
|
||||||
have no way to log into the system via the dashboard.
|
|
||||||
|
|
||||||
|
|
||||||
``WEBSSO_IDP_MAPPING``
|
|
||||||
----------------------
|
|
||||||
|
|
||||||
.. versionadded:: 8.0.0(Liberty)
|
|
||||||
|
|
||||||
Default: ``{}``
|
|
||||||
|
|
||||||
A dictionary of specific identity provider and federation protocol combinations.
|
|
||||||
From the selected authentication mechanism, the value will be looked up as keys
|
|
||||||
in the dictionary. If a match is found, it will redirect the user to a identity
|
|
||||||
provider and federation protocol specific WebSSO endpoint in keystone, otherwise
|
|
||||||
it will use the value as the protocol_id when redirecting to the WebSSO by
|
|
||||||
protocol endpoint.
|
|
||||||
|
|
||||||
Example::
|
|
||||||
|
|
||||||
WEBSSO_CHOICES = (
|
|
||||||
("credentials", _("Keystone Credentials")),
|
|
||||||
("oidc", _("OpenID Connect")),
|
|
||||||
("saml2", _("Security Assertion Markup Language")),
|
|
||||||
("acme_oidc", "ACME - OpenID Connect"),
|
|
||||||
("acme_saml2", "ACME - SAML2")
|
|
||||||
)
|
|
||||||
|
|
||||||
WEBSSO_IDP_MAPPING = {
|
|
||||||
"acme_oidc": ("acme", "oidc"),
|
|
||||||
"acme_saml2": ("acme", "saml2")
|
|
||||||
}
|
|
||||||
|
|
||||||
.. note::
|
|
||||||
The value is expected to be a tuple formatted as: (<idp_id>, <protocol_id>).
|
|
||||||
|
|
||||||
``TOKEN_DELETE_DISABLED``
|
|
||||||
-------------------------
|
|
||||||
|
|
||||||
.. versionadded:: 10.0.0(Newton)
|
|
||||||
|
|
||||||
Default: ``False``
|
|
||||||
|
|
||||||
This setting allows deployers to control whether a token is deleted on log out.
|
|
||||||
This can be helpful when there are often long running processes being run
|
|
||||||
in the Horizon environment.
|
|
||||||
|
|
||||||
``OPENSTACK_CINDER_FEATURES``
|
``OPENSTACK_CINDER_FEATURES``
|
||||||
-----------------------------
|
-----------------------------
|
||||||
|
|
||||||
@ -1499,73 +1343,6 @@ Default: ``False``
|
|||||||
Disable SSL certificate checks in the OpenStack clients (useful for self-signed
|
Disable SSL certificate checks in the OpenStack clients (useful for self-signed
|
||||||
certificates).
|
certificates).
|
||||||
|
|
||||||
|
|
||||||
``OPENSTACK_TOKEN_HASH_ALGORITHM``
|
|
||||||
----------------------------------
|
|
||||||
|
|
||||||
.. versionadded:: 2014.2(Juno)
|
|
||||||
|
|
||||||
Default: ``"md5"``
|
|
||||||
|
|
||||||
The hash algorithm to use for authentication tokens. This must match the hash
|
|
||||||
algorithm that the identity (Keystone) server and the auth_token middleware
|
|
||||||
are using. Allowed values are the algorithms supported by Python's hashlib
|
|
||||||
library.
|
|
||||||
|
|
||||||
|
|
||||||
``OPENSTACK_TOKEN_HASH_ENABLED``
|
|
||||||
--------------------------------
|
|
||||||
|
|
||||||
.. versionadded:: 8.0.0(Liberty)
|
|
||||||
|
|
||||||
(Deprecated)
|
|
||||||
|
|
||||||
Default: ``True``
|
|
||||||
|
|
||||||
Hashing tokens from Keystone keeps the Horizon session data smaller, but it
|
|
||||||
doesn't work in some cases when using PKI tokens. Uncomment this value and
|
|
||||||
set it to False if using PKI tokens and there are 401 errors due to token
|
|
||||||
hashing.
|
|
||||||
|
|
||||||
This option is now marked as "deprecated" and will be removed in Ocata or a
|
|
||||||
later release. PKI tokens currently work with hashing, and Keystone will soon
|
|
||||||
deprecate usage of PKI tokens.
|
|
||||||
|
|
||||||
|
|
||||||
``POLICY_FILES``
|
|
||||||
----------------
|
|
||||||
|
|
||||||
.. versionadded:: 2013.2(Havana)
|
|
||||||
|
|
||||||
Default: ``{'identity': 'keystone_policy.json', 'compute': 'nova_policy.json'}``
|
|
||||||
|
|
||||||
This should essentially be the mapping of the contents of ``POLICY_FILES_PATH``
|
|
||||||
to service types. When policy.json files are added to ``POLICY_FILES_PATH``,
|
|
||||||
they should be included here too.
|
|
||||||
|
|
||||||
|
|
||||||
``POLICY_FILES_PATH``
|
|
||||||
---------------------
|
|
||||||
|
|
||||||
.. versionadded:: 2013.2(Havana)
|
|
||||||
|
|
||||||
Default: ``os.path.join(ROOT_PATH, "conf")``
|
|
||||||
|
|
||||||
Specifies where service based policy files are located. These are used to
|
|
||||||
define the policy rules actions are verified against.
|
|
||||||
|
|
||||||
``SESSION_TIMEOUT``
|
|
||||||
-------------------
|
|
||||||
|
|
||||||
.. versionadded:: 2013.2(Havana)
|
|
||||||
|
|
||||||
Default: ``"3600"``
|
|
||||||
|
|
||||||
This SESSION_TIMEOUT is a method to supercede the token timeout with a shorter
|
|
||||||
horizon session timeout (in seconds). So if your token expires in 60 minutes,
|
|
||||||
a value of 1800 will log users out after 30 minutes.
|
|
||||||
|
|
||||||
|
|
||||||
``SAHARA_AUTO_IP_ALLOCATION_ENABLED``
|
``SAHARA_AUTO_IP_ALLOCATION_ENABLED``
|
||||||
-------------------------------------
|
-------------------------------------
|
||||||
|
|
||||||
@ -1863,6 +1640,14 @@ Default: ``{}``
|
|||||||
|
|
||||||
Same as ``PROJECT_TABLE_EXTRA_INFO``, add additional information for user.
|
Same as ``PROJECT_TABLE_EXTRA_INFO``, add additional information for user.
|
||||||
|
|
||||||
|
Authentication Settings (openstack_auth)
|
||||||
|
========================================
|
||||||
|
|
||||||
|
There are several settings related to the authentication against Keystone.
|
||||||
|
See `Django OpenStack Auth documentation
|
||||||
|
<https://docs.openstack.org/django_openstack_auth/latest/configuration/>`__.
|
||||||
|
All of these settings are also should be configured in
|
||||||
|
``local/local_settings.py`` in the same way as for other dashboard settings.
|
||||||
|
|
||||||
Django Settings (Partial)
|
Django Settings (Partial)
|
||||||
=========================
|
=========================
|
||||||
|
@ -256,7 +256,7 @@ OPENSTACK_KEYSTONE_BACKEND = {
|
|||||||
# This setting allows deployers to control whether a token is deleted on log
|
# This setting allows deployers to control whether a token is deleted on log
|
||||||
# out. This can be helpful when there are often long running processes being
|
# out. This can be helpful when there are often long running processes being
|
||||||
# run in the Horizon environment.
|
# run in the Horizon environment.
|
||||||
#TOKEN_DELETE_DISABLED = False
|
#TOKEN_DELETION_DISABLED = False
|
||||||
|
|
||||||
# The Launch Instance user experience has been significantly enhanced.
|
# The Launch Instance user experience has been significantly enhanced.
|
||||||
# You can choose whether to enable the new launch instance experience,
|
# You can choose whether to enable the new launch instance experience,
|
||||||
|
Loading…
Reference in New Issue
Block a user