Keystone Ldap
- OpenStack Charmers
- Cloud
Channel | Revision | Published | Runs on |
---|---|---|---|
latest/edge | 98 | 18 Nov 2024 | |
latest/edge | 97 | 18 Nov 2024 | |
latest/edge | 96 | 18 Nov 2024 | |
latest/edge | 95 | 18 Nov 2024 | |
latest/edge | 89 | 08 Mar 2024 | |
latest/edge | 86 | 08 Aug 2023 | |
latest/edge | 83 | 12 Apr 2023 | |
latest/edge | 61 | 01 Jul 2022 | |
yoga/stable | 82 | 29 Mar 2023 | |
zed/stable | 72 | 23 Jan 2023 | |
xena/stable | 79 | 16 Jan 2023 | |
wallaby/stable | 77 | 23 Jan 2023 | |
victoria/stable | 76 | 23 Jan 2023 | |
ussuri/stable | 75 | 23 Jan 2023 | |
train/candidate | 73 | 28 Nov 2022 | |
train/edge | 78 | 16 Jan 2023 | |
stein/candidate | 73 | 28 Nov 2022 | |
stein/edge | 78 | 16 Jan 2023 | |
rocky/candidate | 73 | 28 Nov 2022 | |
rocky/edge | 78 | 16 Jan 2023 | |
queens/candidate | 73 | 28 Nov 2022 | |
queens/edge | 78 | 16 Jan 2023 | |
2024.1/candidate | 90 | 24 May 2024 | |
2024.1/candidate | 86 | 24 Jan 2024 | |
2023.2/stable | 87 | 30 Nov 2023 | |
2023.1/stable | 85 | 14 Jun 2023 |
juju deploy keystone-ldap --channel yoga/stable
Deploy universal operators easily with Juju, the Universal Operator Lifecycle Manager.
Platform:
-
domain-name | string
Name of the keystone domain to configure; defaults to the deployed application name.
-
ldap-config-flags | string
Additional LDAP configuration options. For simple configurations use a comma separated string of key=value pairs. "user_allow_create=False, user_allow_update=False, user_allow_delete=False" For more complex configurations use a json like string with double quotes and braces around all the options and single quotes around complex values. "{user_tree_dn: 'DC=dc1,DC=ad,DC=example,DC=com', user_allow_create: False, user_allow_delete: False}" See the README for more details.
Note: The explicitly defined ldap-* charm config options take precedence over the same LDAP config option also specified in ldap-config-flags.
For example, if the LDAP config query_scope is defined in ldap-query-scope as 'one' and in ldap-config-flags as "{query_scope: 'sub'}" then the config query_scope is set to 'one'.
-
ldap-group-id-attribute | string
This option sets the LDAP attribute mapped to group IDs in keystone.
-
ldap-group-member-attribute | string
This option sets the LDAP attribute that indicates user is a member of the group.
-
ldap-group-members-are-ids | boolean
Enable this option if the members of group object class are keystone user IDs rather than LDAP DNs.
-
ldap-group-name-attribute | string
This option sets the LDAP attribute mapped to group names in keystone.
-
ldap-group-objectclass | string
This option sets the LDAP object class for groups.
-
ldap-group-tree-dn | string
This option sets the search base to use for the groups.
-
ldap-password | string
Password of the LDAP identity server. For anonymous binding, leave ldap-user and ldap-password empty.
-
ldap-pool-connection-timeout | int
The connection timeout to use when pooling LDAP connections. A value of -1 means the connection will never timeout.
-
ldap-pool-retry-max | int
This option allows to set the maximum number of retry attempts to connect to LDAP server before aborting.
-
ldap-pool-size | int
This option sets the size of LDAP connection pool.
-
ldap-query-scope | string
This option controls the scope level of data presented through LDAP.
-
ldap-readonly | boolean
Default: True
LDAP identity server backend readonly to keystone.
-
ldap-server | string
LDAP server URL for keystone LDAP identity backend.
Examples: ldap://10.10.10.10/ ldaps://10.10.10.10/ ldap://example.com:389,ldaps://ldaps.example.com:636 ldap://active-directory-host.com:3268/ ldaps://active-directory-host.com:3269/
An ldap:// URL will result in mandatory StartTLS usage if either the charm's tls-ca-ldap option has been specified or if the 'certificates' relation is present.
-
ldap-suffix | string
LDAP server suffix to be used by keystone.
-
ldap-use-pool | boolean
This option enables LDAP connection pooling.
-
ldap-user | string
Username (Distinguished Name) used to bind to LDAP identity server. For anonymous binding, leave ldap-user and ldap-password empty.
Example: cn=admin,dc=test,dc=com
-
ldap-user-enabled-attribute | string
This option sets the LDAP attribute mapped to the user enabled attribute in keystone.
-
ldap-user-enabled-default | string
The default value to enable users. The LDAP servers can use boolean or bit in the user enabled attribute to indicate if a user is enabled or disabled. If boolean is used by the ldap schema, then the appropriate value for this option is 'True' or 'False'. If bit is used by the ldap schema, this option should match an appropriate integer value based on ldap-user-enabled-mask. Please note the integer value should be specified as a string in quotes. This option is typically used when ldap-user-enabled-attribute is set to 'userAccountControl'.
Example: Configuration options to use for ldap schema with userAccountControl as control attribute, uses bit 1 in control attribute to indicate enablement.
ldap-user-enabled-attribute = "userAccountControl" ldap-user-enabled-mask = 2 ldap-user-enabled-default = "512"
ldap-user-enabled-default should be set to integer value that represents a user being enabled. For Active Directory, 512 represents Normal Account.
For more information on how to set up those config options, please refer to the OpenStack docs on Keystone and LDAP integration at https://docs.openstack.org/keystone/latest/admin/configuration.html#integrate-identity-back-end-with-ldap
-
ldap-user-enabled-emulation | boolean
If enabled, keystone uses an alternative method to determine if a user is enabled or not by checking if they are a member of the group defined by the ldap-user-enabled_emulation-dn option.
-
ldap-user-enabled-emulation-dn | string
DN of the group entry to hold enabled users when using enabled emulation. Setting this option has no effect when ldap-user-enabled-emulation is False.
-
ldap-user-enabled-invert | boolean
Setting this option to True allows LDAP servers to use lock attributes. This option has no effect when ldap-user-enabled-mask or ldap-user-enabled-emulation are in use.
-
ldap-user-enabled-mask | int
Bitmask integer to select which bit indicates the enabled value if the LDAP server represents enabled as a bit on an integer rather than as a discrete boolean. If the option is set to 0, the mask is not used. This option is typically used when ldap-user-enabled-attribute is set to 'userAccessControl'.
-
ldap-user-filter | string
This option sets the LDAP search filter to use for the users.
-
ldap-user-id-attribute | string
This option sets the LDAP attribute mapped to User IDs in keystone.
-
ldap-user-name-attribute | string
This option sets the LDAP attribute mapped to User names in keystone.
-
ldap-user-objectclass | string
This option sets the LDAP object class for users.
-
ldap-user-tree-dn | string
This option sets the search base to use for the users.
-
tls-ca-ldap | string
This option controls which certificate (or a chain) will be used to connect to an ldap server(s) over TLS. Certificate contents should be either used directly or included via include-file:// An LDAP url should also be considered as ldaps and StartTLS are both valid methods of using TLS (see RFC 4513) with StartTLS using a non-ldaps url which, of course, still requires a CA certificate.