Skip to content

Commit

Permalink
Update docs/05-iam/index.md
Browse files Browse the repository at this point in the history
Co-authored-by: Arvid Requate <requate@univention.de>
Signed-off-by: Juan Pedro Torres <JuanP.95.torres@gmail.com>
  • Loading branch information
JuanPTM and reqa committed Feb 21, 2024
1 parent 21b7886 commit 5bedb9c
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions docs/05-iam/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -65,9 +65,9 @@ The section on [inter SCS federation setup](https://docs.scs.community/docs/iam/
see possibilities and alignement with upstream OpenDev development plans. Automatically creating `ephemeral` users in
their specific OpenStack domains, as specified in their OIDC token is one example, currently beeing worked on. Please
check carefully if the technical results meet the security demands of your specific environment.
- Keystone currently has another limitation. This is limitation is also being addressed by the SCS development team aligned
with upstream OpenDev development plans. The roles for federated users are stored on the database for the `ephemeral` users
created during a federated login. This also limits the ability to modify users roles from the identity source directly, as roles of
- Keystone currently has another limitation which is being addressed by the SCS development team aligned
with upstream OpenDev development plans: The roles for federated users are stored on the database for the `ephemeral` users
created during a federated login. This limits the ability to modify users roles from the identity source directly, as roles of
the `epehemeral` users do not get cleaned up or updated based on changes in the claims contained in the OpenID-Connect token.

### Current state and future Outlook
Expand Down

0 comments on commit 5bedb9c

Please sign in to comment.