Commit Graph

9 Commits

Author SHA1 Message Date
Samriddhi Jain 459f078d0c Reorganised keystone documentation structure
Divided the keystone docs into four categories, depending
upon the usage criteria: general information (which will
be common for all), developer documentation,
user documantation and operator documentation.

Change-Id: I2f5dd41acd9874739accc54c4f4fd69460b58334
2017-06-22 13:26:46 +05:30
zlyqqq f2c1b0bef6 Error api about grant collections in policy_mapping.rst
Change-Id: I5511790451a71adbcea95bd19204feb0f44d472b
2017-05-18 09:55:37 +08:00
Lance Bragstad 100050184c Implement password requirements API
Add an API for retrieving password requirement information from
``keystone.conf``. This should be used by user interfaces and clients
if/when they enforce PCI-DSS requirements.

Change-Id: I4c405da3a59e510cda5b46222cc3a20d568c7437
implements: bp pci-dss-password-requirements-api
2016-12-15 19:51:41 +00:00
Ronald De Rose eed233cac8 Concrete role assignments for federated users
"Shadow users: unified identity" implementation:
Allow concrete role assignments for federated users. Currently,
federated users get roles from mapped group assignments. However, with
the shadow users implementation, federated users are mapped to
identities in the backend; thus, can be assigned roles.

This patch returns locally assigned roles with the mapped group roles
for federated users; allowing for authorization for those roles.

bp shadow-users-newton

Change-Id: I9a150ded6c4b556627147d2671be15d6a3794ba5
2016-06-29 02:24:03 +00:00
Henry Nash a16287af5b Modify rules in the v3 policy sample for domain specifc roles
Currently, for global roles, cloud admin has full CRUD permissions
for roles, although a domain or project admin can read roles
(i.e. Get or List). This remains the case.

For domain specific roles, in addition to cloud admin, the domain
admin also has full CRUD permissions for the domain specific roles
of their own domain (but no permissions to see any domain specific
roles from other domains). In addition, a project admin can read
(i.e. Get or List) the domain specific roles from their domain
(but again no permissions to see any domain specific roles from
other domains).

Partially Implements: blueprint domain-specific-roles

Change-Id: I53499f164bfa4d3e65b70b9586b6fe0d71b60f41
2016-02-16 17:00:57 +00:00
Adam Young e1b5751a4c Implied Roles API
CRD for implied roles.
Iplied roles are expanded in token issue and validation responses.
Explicitly forbids creating a rule with admin as the implied role to
  avoid escalation of privileges.

Co-Authored-By: Henry Nash <henryn@linux.vnet.ibm.com>
implements: blueprint implied-roles
Change-Id: I812843adb9a1748fb471325797dad80e1baea565
2016-01-29 16:47:21 +00:00
Henry Nash a06bfe8be3 Support the reading of default values of domain configuration options
The whitelisted configuration options, that are supported as part
of the domain specific configuration functionality, can now have
their defualt values read via the Identity API.

DocImpact
Change-Id: I9b1073f4d43c69f03fc920eee2712305524c1300
Implements: blueprint domain-config-default
2016-01-15 06:20:38 +00:00
Henry Nash a9a47b62c8 Add API route for list role assignments for tree
This patch adds the API routing (and appropriate REST API
tests) to call the manager support for listing role
assignments for a tree of projects that was implemented in
the earlier patch.

In order to support the required policy rule, the protection
wrapper for filter list calls was extended to support a callback
(in the same way that the regular protection wrapper already did).

Implements: bp list-assignment-subtree
Change-Id: I3495c7cab3b40811b2722ac7d70ddda30410b62b
2015-12-11 14:13:51 +00:00
Brant Knudson 3a25da6faf Document policy target for operation
Adds documentation that shows the policy target for each
operation.

Closes-Bug: 1424496
Change-Id: I3e526d6a3268b949c0b9876b9a7748129981d6e5
2015-07-20 16:44:26 -05:00