Keystone LDAP integration [closed]

asked 2014-04-03 10:58:53 -0500

racingferret gravatar image

Hi Guys,

I have an OpenStack Havana installation and we have a requirement to integrate it with LDAP. I have been following the instructions on this page ( http://openstack.redhat.com/Keystone_integration_with_IDM (http://openstack.redhat.com/Keystone_...) ), with some success and can now log in with an alternative "admin" user called "osadmin".

The problem is that within Horizon, I'm greeted with two errors upon login: Error: Unauthorised: Unable to retrieve usage information. Error: Unauthorised: Unable to retrieve limit information.

This continues for each of the pages that I click on. On the command line, when I source my creds for "osadmin" I can list users, roles and tenants, but if I try to retrieve a flavor list, I'm not authorised:

root@node-5:~# nova --debug flavor-list

REQ: curl -i http://192.168.0.3:5000/v2.0/tokens -X POST -H "Content-Type: application/json" -H "Accept: application/json" -H "User-Agent: python-novaclient" -d '{"auth": {"tenantName": "admin", "passwordCredentials": {"username": "osadmin", "password": "osadmin"}}}'

INFO (connectionpool:202) Starting new HTTP connection (1): 192.168.0.3
DEBUG (connectionpool:296) "POST /v2.0/tokens HTTP/1.1" 200 2710
RESP: [200] CaseInsensitiveDict({'date': 'Wed, 02 Apr 2014 18:30:55 GMT', 'vary': 'X-Auth-Token', 'content-length': '2710', 'content-type': 'application/json'})
RESP BODY: {"access": {"token": {"issued_at": "2014-04-02T18:30:55.578617", "expires": "2014-04-03T18:30:55Z", "id": "92db3daf37454ca78ebf0d7c247778c5", "tenant": {"enabled": true, "description": "Admin Tenant", "name": "admin", "id": "c4d981b1d47c49d3a4bd8bc467073c40"}}, "serviceCatalog": [{"endpoints": [{"adminURL": "http://192.168.0.3:8774/v2/c4d981b1d47c49d3a4bd8bc467073c40", "region": "RegionOne", "internalURL": "http://192.168.0.3:8774/v2/c4d981b1d47c49d3a4bd8bc467073c40", "id": "0dfdbe209bda44c9aeb101865fe48dd9", "publicURL": "http://172.16.0.3:8774/v2/c4d981b1d47c49d3a4bd8bc467073c40"}], "endpoints_links": [], "type": "compute", "name": "nova"}, {"endpoints": [{"adminURL": "http://192.168.0.3:9696", "region": "RegionOne", "internalURL": "http://192.168.0.3:9696", "id": "1747865618ff47b6a068820ed108769d", "publicURL": "http://172.16.0.3:9696"}], "endpoints_links": [], "type": "network", "name": "neutron"}, {"endpoints": [{"adminURL": "http://192.168.0.3:9292", "region": "RegionOne", "internalURL": "http://192.168.0.3:9292", "id": "847f45e1441d4a48ac441141892a00bf", "publicURL": "http://172.16.0.3:9292"}], "endpoints_links": [], "type": "image", "name": "glance"}, {"endpoints": [{"adminURL": "http://192.168.0.3:8776/v1/c4d981b1d47c49d3a4bd8bc467073c40", "region": "RegionOne", "internalURL": "http://192.168.0.3:8776/v1/c4d981b1d47c49d3a4bd8bc467073c40", "id": "172c31895c3c4cc8ba617ccd611c545b", "publicURL": "http://172.16.0.3:8776/v1/c4d981b1d47c49d3a4bd8bc467073c40"}], "endpoints_links": [], "type": "volume", "name": "cinder"}, {"endpoints": [{"adminURL": "http://192.168.0.3:8773/services/Admin", "region": "RegionOne", "internalURL": "http://192.168.0.3:8773/services/Cloud", "id": "0df6eee555134ae8b3c96a0a57880e1c", "publicURL": "http://172.16.0.3:8773/services/Cloud"}], "endpoints_links": [], "type": "ec2", "name": "nova_ec2"}, {"endpoints": [{"adminURL": "http://192.168.0.3:8004/v1/c4d981b1d47c49d3a4bd8bc467073c40", "region": "RegionOne", "internalURL": "http://192.168.0.3:8004/v1/c4d981b1d47c49d3a4bd8bc467073c40", "id": "1959faa1878243d7b8e60a68b8a3fd1f", "publicURL": "http://172.16.0.3:8004/v1/c4d981b1d47c49d3a4bd8bc467073c40"}], "endpoints_links": [], "type": "orchestration", "name": "heat"}, {"endpoints": [{"adminURL": "http://192.168.0.3:35357/v2.0", "region": "RegionOne", "internalURL": "http://192.168.0.3:5000/v2.0", "id": "0694e4371eaa457eb11cbc5d5556e94b", "publicURL": "http://172.16.0.3:5000/v2.0"}], "endpoints_links": [], "type": "identity", "name": "keystone"}], "user": {"username": "osadmin", "roles_links": [], "id": "osadmin", "roles": [{"name": "admin"}], "name": "osadmin"}, "metadata": {"is_admin": 0, "roles": ["b5cc07da9685470dbcb2bc27e9a80b13"]}}}


REQ: curl -i http://172.16.0 ...
(more)
edit retag flag offensive reopen merge delete

Closed for the following reason the question is answered, right answer was accepted by racingferret
close date 2014-04-04 10:07:21.405564

Comments

Is Keystone mapping to ldap and allowing you to list users? If you do:

keystone user-list

Do you get back LDAP users? Is it a requirement to manage everything through LDAP or can you use SQL for assignment? If you can use SQL for assignment (roles, tenants) then it's a lot easier.

mpetason gravatar imagempetason ( 2014-04-03 11:18:18 -0500 )edit

Thanks for the info... I've kept roles and tenants in a DB as you suggested and only my users and service accounts are in LDAP. Works like a charm!

racingferret gravatar imageracingferret ( 2014-04-04 10:06:32 -0500 )edit

Yep it's a lot easier.

mpetason gravatar imagempetason ( 2014-04-04 13:40:41 -0500 )edit