Skip to content

Commit

Permalink
Document federated users role limitation #360 (#138)
Browse files Browse the repository at this point in the history
* Document federated users role limitation #360

Signed-off-by: Juan Pedro Torres <juan.torres-munoz@univention.de>

* Update docs/05-iam/index.md

Co-authored-by: Arvid Requate <requate@univention.de>
Signed-off-by: Juan Pedro Torres <JuanP.95.torres@gmail.com>

* Update docs/05-iam/index.md

Co-authored-by: Arvid Requate <requate@univention.de>
Signed-off-by: Juan Pedro Torres <JuanP.95.torres@gmail.com>

* Fix links

Signed-off-by: Juan Pedro Torres <juan.torres-munoz@univention.de>

---------

Signed-off-by: Juan Pedro Torres <juan.torres-munoz@univention.de>
Signed-off-by: Juan Pedro Torres <JuanP.95.torres@gmail.com>
Co-authored-by: Juan Pedro Torres <juan.torres-munoz@univention.de>
Co-authored-by: Arvid Requate <requate@univention.de>
  • Loading branch information
3 people authored Feb 23, 2024
1 parent 8a3c2ed commit 7b881f4
Showing 1 changed file with 5 additions and 1 deletion.
6 changes: 5 additions & 1 deletion docs/05-iam/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ The idea is that customer can create groups with specific names in their own IAM
These shall be mapped to a claim `groups` to be included in the OIDC token.
Via the Keystone [mapping](https://docs.openstack.org/keystone/latest/admin/federation/mapping_combinations.html)
they shall be mapped to roles on OpenStack projects.
[The corresponding section for Developers](https://docs.scs.community/dev-docs/operations/iam/identity-federation-in-scs) may be interesting for more technical details.
[The corresponding section for Developers](https://docs.scs.community/contributor-docs/operations/iam/identity-federation-in-scs) may be interesting for more technical details.
Please be aware that currently there are still some technical challenges to be solved
within the OpenStack Keystone mapping engine and the mapping rules to make this work
seamlessly.
Expand All @@ -65,6 +65,10 @@ The section on [inter SCS federation setup](https://docs.scs.community/docs/iam/
see possibilities and alignement with upstream OpenDev development plans. Automatically creating `ephemeral` users in
their specific OpenStack domains, as specified in their OIDC token is one example, currently beeing worked on. Please
check carefully if the technical results meet the security demands of your specific environment.
- Keystone currently has another limitation which is being addressed by the SCS development team aligned
with upstream OpenDev development plans: The roles for federated users are stored on the database for the `ephemeral` users
created during a federated login. This limits the ability to modify users roles from the identity source directly, as roles of
the `epehemeral` users do not get cleaned up or updated based on changes in the claims contained in the OpenID-Connect token.

### Current state and future Outlook

Expand Down

0 comments on commit 7b881f4

Please sign in to comment.