Skip to content

Commit

Permalink
Update docs/05-iam/index.md
Browse files Browse the repository at this point in the history
Co-authored-by: Arvid Requate <requate@univention.de>
Signed-off-by: Juan Pedro Torres <JuanP.95.torres@gmail.com>
  • Loading branch information
JuanPTM and reqa committed Feb 21, 2024
1 parent c8d30aa commit 21b7886
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions docs/05-iam/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -65,10 +65,10 @@ The section on [inter SCS federation setup](https://docs.scs.community/docs/iam/
see possibilities and alignement with upstream OpenDev development plans. Automatically creating `ephemeral` users in
their specific OpenStack domains, as specified in their OIDC token is one example, currently beeing worked on. Please
check carefully if the technical results meet the security demands of your specific environment.
- Keystone currently has another limitation. This is limitation is also being addressed byt the SCS development team aligned
- Keystone currently has another limitation. This is limitation is also being addressed by the SCS development team aligned
with upstream OpenDev development plans. The roles for federated users are stored on the database for the `ephemeral` users
created during a federated login. This also limit the ability to modify users roles from the identity source directly, as
the `epehemeral` users roles are not clean up.
created during a federated login. This also limits the ability to modify users roles from the identity source directly, as roles of
the `epehemeral` users do not get cleaned up or updated based on changes in the claims contained in the OpenID-Connect token.

### Current state and future Outlook

Expand Down

0 comments on commit 21b7886

Please sign in to comment.