e4ec1d4446
Install Guide: Add some more glossterm entries. Security Guide: Add glossterm entries for SPICE, VNC Add new entries "OpenStack", "role", "service", and "SPICE" to the glossary itself. Change-Id: Ibc93970c544012db45e47c5467145675dcef5149
66 lines
3.4 KiB
XML
66 lines
3.4 KiB
XML
<section xmlns="http://docbook.org/ns/docbook"
|
|
xmlns:xlink="http://www.w3.org/1999/xlink"
|
|
version="5.0"
|
|
xml:id="keystone-users" os="rhel;centos;fedora;opensuse;sles;ubuntu">
|
|
<title>Define users, tenants, and roles</title>
|
|
|
|
<para>After you install the Identity Service, set up
|
|
<glossterm baseform="user">users</glossterm>,
|
|
<glossterm baseform="tenant">tenants</glossterm>, and
|
|
<glossterm baseform="role">roles</glossterm> to authenticate
|
|
against. These are used to allow access to
|
|
services and <glossterm baseform="endpoint">endpoints</glossterm>, described
|
|
in the next section.</para>
|
|
|
|
<para>Typically, you would indicate a user and password to
|
|
authenticate with the Identity Service. At this point, however, we
|
|
have not created any users, so we have to use the authorization
|
|
token created in the previous section. You can pass this with the
|
|
<option>--os-token</option> option to the
|
|
<command>keystone</command> command or set the
|
|
<envar>OS_SERVICE_TOKEN</envar> environment variable. We'll set
|
|
<envar>OS_SERVICE_TOKEN</envar>, as well as
|
|
<envar>OS_SERVICE_ENDPOINT</envar> to specify where the Identity
|
|
Service is running. Replace
|
|
<userinput><replaceable>FCAF3E...</replaceable></userinput>
|
|
with your authorization token.</para>
|
|
|
|
<screen><prompt>#</prompt> <userinput>export OS_SERVICE_TOKEN=<replaceable>FCAF3E...</replaceable></userinput>
|
|
<prompt>#</prompt> <userinput>export OS_SERVICE_ENDPOINT=http://controller:35357/v2.0</userinput></screen>
|
|
|
|
<para>First, create a tenant for an administrative user and a tenant
|
|
for other OpenStack services to use.</para>
|
|
|
|
<screen><prompt>#</prompt> <userinput>keystone tenant-create --name=admin --description="Admin Tenant"</userinput>
|
|
<prompt>#</prompt> <userinput>keystone tenant-create --name=service --description="Service Tenant"</userinput></screen>
|
|
|
|
<para>Next, create an administrative user called <literal>admin</literal>.
|
|
Choose a password for the <literal>admin</literal> user and specify an
|
|
email address for the account.</para>
|
|
|
|
<screen><prompt>#</prompt> <userinput>keystone user-create --name=admin --pass=<replaceable>ADMIN_PASS</replaceable> \
|
|
--email=<replaceable>admin@example.com</replaceable></userinput></screen>
|
|
|
|
<para>Create a role for administrative tasks called <literal>admin</literal>.
|
|
Any roles you create should map to roles specified in the
|
|
<filename>policy.json</filename> files of the various OpenStack services.
|
|
The default policy files use the <literal>admin</literal> role to allow
|
|
access to most services.</para>
|
|
|
|
<screen><prompt>#</prompt> <userinput>keystone role-create --name=admin</userinput></screen>
|
|
|
|
<para>Now, you have to add roles to users. Users always log in with
|
|
a tenant, and roles are assigned to users within tenants. Add the
|
|
<literal>admin</literal> role to the <literal>admin</literal> user when
|
|
logging in with the <literal>admin</literal> tenant.</para>
|
|
|
|
<screen><prompt>#</prompt> <userinput>keystone user-role-add --user=admin --tenant=admin --role=admin</userinput></screen>
|
|
|
|
<para>
|
|
Add the <literal>_member_</literal> role to the <literal>admin</literal>
|
|
user. This is a special role that grants access to the OpenStack Dashboard.
|
|
</para>
|
|
<screen><prompt>#</prompt> <userinput>keystone user-role-add --user=admin --tenant=admin --role=_member_</userinput></screen>
|
|
|
|
</section>
|