OpenStack typo
Change-Id: I86aaa35d07ebe1acb20f8944da7b32bdae317e48
This commit is contained in:
parent
522148593d
commit
d1aea0b3fc
@ -29,9 +29,9 @@ providing user authentication through the LDAP directory.
|
||||
|
||||
For the OpenStack Identity service to access LDAP servers, you must
|
||||
enable the ``authlogin_nsswitch_use_ldap`` boolean value for SELinux
|
||||
on the Openstack Identity server. To enable and make the option
|
||||
persistent across reboots, set the following boolean value as the
|
||||
root user:
|
||||
on the server running the OpenStack Identity service. To enable and
|
||||
make the option persistent across reboots, set the following boolean
|
||||
value as the root user:
|
||||
|
||||
.. code-block:: console
|
||||
|
||||
|
@ -5,25 +5,25 @@
|
||||
version="5.0"
|
||||
xml:id="configuring-keystone-for-ldap-backend">
|
||||
<title>Integrate Identity with LDAP</title>
|
||||
<para>The Openstack Identity Service supports integration with
|
||||
<para>The OpenStack Identity service supports integration with
|
||||
existing LDAP directories for authentication and authorization
|
||||
services.</para>
|
||||
<para>When the Openstack Identity service is configured to use LDAP
|
||||
<para>When the OpenStack Identity service is configured to use LDAP
|
||||
back ends, you can split authentication (using the
|
||||
<emphasis>identity</emphasis> feature) and
|
||||
authorization (using the
|
||||
<emphasis>assignment</emphasis> feature).</para>
|
||||
<para>The identity feature enables administrators to manage
|
||||
users and groups by each domain or the Openstack Identity Service entirely.</para>
|
||||
users and groups by each domain or the OpenStack Identity service entirely.</para>
|
||||
<para>The Assignments feature enables administrators to manage
|
||||
project role authorization using the Openstack Identity service SQL
|
||||
project role authorization using the OpenStack Identity service SQL
|
||||
database, while providing user authentication through the
|
||||
LDAP directory.</para>
|
||||
<important os="rhel;fedora;centos">
|
||||
<para>For OpenStack Identity service to access LDAP servers, you must
|
||||
enable the <option>authlogin_nsswitch_use_ldap</option> boolean
|
||||
value for SELinux on the Openstack Identity server. To enable and
|
||||
make the option persistent across reboots:</para>
|
||||
value for SELinux on the server running the OpenStack Identity service. To
|
||||
enable and make the option persistent across reboots:</para>
|
||||
<screen><prompt>#</prompt> <userinput>setsebool -P authlogin_nsswitch_use_ldap on</userinput></screen>
|
||||
</important>
|
||||
<para>Identity configuration is split into two separate back ends: identity
|
||||
@ -36,7 +36,7 @@
|
||||
for assignment back end configuration examples.
|
||||
Modify these examples as needed.</para>
|
||||
<note>
|
||||
<para>Multiple back ends are supported. You can integrate the Openstack Identity service
|
||||
<para>Multiple back ends are supported. You can integrate the OpenStack Identity service
|
||||
with a single LDAP server (configure both identity and assignments to
|
||||
LDAP, or set identity and assignments back end with SQL or LDAP),
|
||||
or multiple back ends using domain-specific configuration files.</para>
|
||||
@ -127,7 +127,7 @@ auth_pool_connection_lifetime = 60</programlisting>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
<para>When you have finished configuration, restart the Openstack Identity service:</para>
|
||||
<para>When you have finished configuration, restart the OpenStack Identity service:</para>
|
||||
<screen><prompt>#</prompt> <userinput>service keystone restart</userinput></screen>
|
||||
<warning><para>During service restart, authentication and
|
||||
authorization are unavailable.</para></warning>
|
||||
|
Loading…
Reference in New Issue
Block a user