OpenStack typo

Change-Id: I86aaa35d07ebe1acb20f8944da7b32bdae317e48
This commit is contained in:
venkatamahesh 2015-11-05 10:38:24 +05:30
parent 522148593d
commit d1aea0b3fc
2 changed files with 11 additions and 11 deletions

View File

@ -29,9 +29,9 @@ providing user authentication through the LDAP directory.
For the OpenStack Identity service to access LDAP servers, you must
enable the ``authlogin_nsswitch_use_ldap`` boolean value for SELinux
on the Openstack Identity server. To enable and make the option
persistent across reboots, set the following boolean value as the
root user:
on the server running the OpenStack Identity service. To enable and
make the option persistent across reboots, set the following boolean
value as the root user:
.. code-block:: console

View File

@ -5,25 +5,25 @@
version="5.0"
xml:id="configuring-keystone-for-ldap-backend">
<title>Integrate Identity with LDAP</title>
<para>The Openstack Identity Service supports integration with
<para>The OpenStack Identity service supports integration with
existing LDAP directories for authentication and authorization
services.</para>
<para>When the Openstack Identity service is configured to use LDAP
<para>When the OpenStack Identity service is configured to use LDAP
back ends, you can split authentication (using the
<emphasis>identity</emphasis> feature) and
authorization (using the
<emphasis>assignment</emphasis> feature).</para>
<para>The identity feature enables administrators to manage
users and groups by each domain or the Openstack Identity Service entirely.</para>
users and groups by each domain or the OpenStack Identity service entirely.</para>
<para>The Assignments feature enables administrators to manage
project role authorization using the Openstack Identity service SQL
project role authorization using the OpenStack Identity service SQL
database, while providing user authentication through the
LDAP directory.</para>
<important os="rhel;fedora;centos">
<para>For OpenStack Identity service to access LDAP servers, you must
enable the <option>authlogin_nsswitch_use_ldap</option> boolean
value for SELinux on the Openstack Identity server. To enable and
make the option persistent across reboots:</para>
value for SELinux on the server running the OpenStack Identity service. To
enable and make the option persistent across reboots:</para>
<screen><prompt>#</prompt> <userinput>setsebool -P authlogin_nsswitch_use_ldap on</userinput></screen>
</important>
<para>Identity configuration is split into two separate back ends: identity
@ -36,7 +36,7 @@
for assignment back end configuration examples.
Modify these examples as needed.</para>
<note>
<para>Multiple back ends are supported. You can integrate the Openstack Identity service
<para>Multiple back ends are supported. You can integrate the OpenStack Identity service
with a single LDAP server (configure both identity and assignments to
LDAP, or set identity and assignments back end with SQL or LDAP),
or multiple back ends using domain-specific configuration files.</para>
@ -127,7 +127,7 @@ auth_pool_connection_lifetime = 60</programlisting>
</listitem>
</varlistentry>
</variablelist>
<para>When you have finished configuration, restart the Openstack Identity service:</para>
<para>When you have finished configuration, restart the OpenStack Identity service:</para>
<screen><prompt>#</prompt> <userinput>service keystone restart</userinput></screen>
<warning><para>During service restart, authentication and
authorization are unavailable.</para></warning>