Merge "Moved oauth1 extension into core."

This commit is contained in:
Jenkins 2016-04-28 19:41:34 +00:00 committed by Gerrit Code Review
commit 002b6bf209
2 changed files with 75 additions and 74 deletions

View File

@ -38,13 +38,6 @@ OS-INHERIT extension (OS-INHERIT)
</para>
</listitem>
<listitem>
<para>
<link xlink:href="http://developer.openstack.org/api-ref-identity-v3-ext.html#identity_v3_OS-OAUTH1-ext">
OAuth extension (OS-OAUTH1)
</link>
</para>
</listitem>
<listitem>
<para>
<link xlink:href="http://developer.openstack.org/api-ref-identity-v3-ext.html#identity_v3_OS-TRUST-ext">
Trust extension (OS-TRUST)
@ -360,73 +353,6 @@ Trust extension (OS-TRUST)
</wadl:resource>
</wadl:resources>
</section>
<section xml:id="identity_v3_OS-OAUTH1-ext">
<title>OAuth extension (OS-OAUTH1)</title>
<para>
Enables users to delegate roles to third-party consumers through
<link xlink:href="http://tools.ietf.org/html/rfc5849">The
OAuth 1.0 Protocol</link>.
</para>
<para>
A user is an Identity API user who delegates its roles and who
authorizes request tokens.
</para>
<para>
A consumer is a third-party application that uses OAuth to access
a protected resource.
</para>
<para>
Administrative users use an OAuth-derived token to act on behalf
of the authorizing user.
</para>
<para>
The consumer uses a request token to get authorization from the
user. The consumer provides an OAuth verifier string with the
request token in exchange for an access token.
</para>
<para>
The consumer uses an access token to request Identity API tokens
on behalf of the authorizing user instead of using the credentials
for the user.
</para>
<para>
Request and access tokens use token keys to identify themselves.
For OpenStack purposes, the token key is the token ID. The
consumer uses a token secret to establish ownership of a token.
Both request and access tokens have token secrets.
</para>
<para>
Delegated authentication through OAuth occurs as follows:
</para>
<orderedlist>
<listitem>
<para>A user creates a consumer.</para>
</listitem>
<listitem>
<para>The consumer gets an unauthorized request token.
Then, the consumer uses the request token to
initiate user authorization.</para>
</listitem>
<listitem>
<para>The user authorizes the request token.</para>
</listitem>
<listitem>
<para>
The consumer exchanges the authorized request token and
the OAuth verifier for an access token.
</para>
<para>The authorizing user receives the request token
key from the consumer out-of-band.</para>
</listitem>
<listitem>
<para>The consumer uses the access token to request an
Identity API token.</para>
</listitem>
</orderedlist>
<wadl:resources
href="../wadls/identity-api/src/v3/wadl/OS-OAUTH1-v3.wadl"
xmlns:wadl="http://wadl.dev.java.net/2009/02"/>
</section>
<section xml:id="identity_v3_OS-TRUST-ext">
<title>Trust extension (OS-TRUST)</title>
<para>

View File

@ -103,6 +103,11 @@
<link xlink:href="http://developer.openstack.org/api-ref-identity-v3.html#users-v3">Users</link>
</para>
</listitem>
<listitem>
<para>
<link xlink:href="http://developer.openstack.org/api-ref-identity-v3.html#identity_v3_OS-OAUTH1">OAuth (OS-OAUTH1)</link>
</para>
</listitem>
</itemizedlist>
<!-- ************************************ -->
<!-- API VERSIONS -->
@ -807,4 +812,74 @@
</wadl:resource>
</wadl:resources>
</section>
<!-- ************************************ -->
<!-- OAuth (OS-OAUTH1) -->
<!-- ************************************ -->
<section xml:id="identity_v3_OS-OAUTH1">
<title>OAuth OAuth (OS-OAUTH1)</title>
<para>
Enables users to delegate roles to third-party consumers through
<link xlink:href="http://tools.ietf.org/html/rfc5849">The
OAuth 1.0 Protocol</link>.
</para>
<para>
A user is an Identity API user who delegates its roles and who
authorizes request tokens.
</para>
<para>
A consumer is a third-party application that uses OAuth to access
a protected resource.
</para>
<para>
Administrative users use an OAuth-derived token to act on behalf
of the authorizing user.
</para>
<para>
The consumer uses a request token to get authorization from the
user. The consumer provides an OAuth verifier string with the
request token in exchange for an access token.
</para>
<para>
The consumer uses an access token to request Identity API tokens
on behalf of the authorizing user instead of using the credentials
for the user.
</para>
<para>
Request and access tokens use token keys to identify themselves.
For OpenStack purposes, the token key is the token ID. The
consumer uses a token secret to establish ownership of a token.
Both request and access tokens have token secrets.
</para>
<para>
Delegated authentication through OAuth occurs as follows:
</para>
<orderedlist>
<listitem>
<para>A user creates a consumer.</para>
</listitem>
<listitem>
<para>The consumer gets an unauthorized request token.
Then, the consumer uses the request token to
initiate user authorization.</para>
</listitem>
<listitem>
<para>The user authorizes the request token.</para>
</listitem>
<listitem>
<para>
The consumer exchanges the authorized request token and
the OAuth verifier for an access token.
</para>
<para>The authorizing user receives the request token
key from the consumer out-of-band.</para>
</listitem>
<listitem>
<para>The consumer uses the access token to request an
Identity API token.</para>
</listitem>
</orderedlist>
<wadl:resources
href="../wadls/identity-api/src/v3/wadl/OS-OAUTH1-v3.wadl"
xmlns:wadl="http://wadl.dev.java.net/2009/02"/>
</section>
</chapter>