Keystone - OpenStack's Identity service - provides secure controlled access to a cloud's resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access. Whether the cloud is private, public, or
Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone
β Scribed by Steve Martinelli, Henry Nash, Brad Topol
- Publisher
- O'Reilly Media
- Year
- 2016
- Tongue
- English
- Leaves
- 130
- Edition
- 1 (2nd Release)
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
KeystoneβOpenStack's Identity serviceβprovides secure controlled access to a cloudβs resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.
Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layerβas well as key practices for safeguarding your cloud's ongoing security.
- Learn about Keystone's fundamental capabilities for providing Identity, Authentication, and Access Management
- Perform basic Keystone operations, using concrete examples and the latest version (v3) of Keystone's Identity API
- Understand Keystone's unique support for multiple token formats, including how it has evolved over time
- Get an in-depth explanation of Keystone's LDAP support and how to configure Keystone to integrate with LDAP
- Learn about one of Keystone's most sought-after featuresβsupport for federated identity
β¦ Subjects
Systems Analysis Design Computer Science Computers Technology LAN Networks Protocols APIs Networking Cloud Computing Network Administration Disaster Recovery Email Linux UNIX Storage Retrieval Windows Software Development Testing Engineering Programming New Used Rental Textbooks Specialty Boutique
π SIMILAR VOLUMES
This comprehensive guide will help you to choose the right practical option and make strategic decisions about the OpenStack cloud environment to fit your infrastructure in production. At the start, this book will explain the OpenStack core architecture. You will soon be shown how to create your ow
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how t
<p><b>Discover new opportunities to empower your private cloud by making the most of the OpenStack universe</b></p><h4>Key Features</h4><ul><li>This practical guide teaches you how to extend the core functionalities of OpenStack</li><li>Discover OpenStack's flexibility by writing custom applications
<p><b>Discover new opportunities to empower your private cloud by making the most of the OpenStack universe</b></p><h4>Key Features</h4><ul><li>This practical guide teaches you how to extend the core functionalities of OpenStack</li><li>Discover OpenStack's flexibility by writing custom applications
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, itβs now easier than ever to build and operate your own IAM stack. The most common