OpenID Connect federation¶
As of the Icehouse release, the only federation protocol that is supported is SAML, the purpose of this specification is to enable support for OpenID Connect as a federation protocol.
An Identity Provider (IdP) that issues and handles OpenID Connect requests wishes to allow its users access to an OpenStack Cloud. Currently this is not possible as the only federation protocol supported is SAML.
Create a new auth plugin or module for OpenID Connect requests.
Re-use the mapping engine to map any OpenID Connect attribues that are presented to Keystone attributes.
Leverage Apache plugin
mod_auth_openidcto handle the requests.
Note: This feature should be written once the existing Federation code has been re-engineered, as to avoid unnecessary code duplication.
Add an authentication plugin that takes certain OpenID Connect arguments as parameters, and from the plugin we can send a request to the IdP, and handle the response within the plugin.
The main issue with this alternative is that the user sends her credentials to the Service Provider instead of the Identity Provider.
Ensure we are following the OpenID Connect specifications.
Other End User Impact¶
python-keystoneclient would need to be enhanced to handle OpenID Connect
Other Deployer Impact¶
Add an OpenID Connect auth plugin to handle any necessary OpenID Connect specific data handling.
Relies on re-engineering federation for efficient implementation. See: https://review.openstack.org/#/c/104301/
Extensive documentation will have to be provided to describe any new configurations necessary.