𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone

✍ Scribed by Steve Martinelli, Henry Nash, Brad Topol


Publisher
O'Reilly Media
Year
2016
Tongue
English
Leaves
130
Edition
1 (2nd Release)
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Keystoneβ€”OpenStack's Identity serviceβ€”provides secure controlled access to a cloud’s resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.

Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layerβ€”as well as key practices for safeguarding your cloud's ongoing security.

  • Learn about Keystone's fundamental capabilities for providing Identity, Authentication, and Access Management
  • Perform basic Keystone operations, using concrete examples and the latest version (v3) of Keystone's Identity API
  • Understand Keystone's unique support for multiple token formats, including how it has evolved over time
  • Get an in-depth explanation of Keystone's LDAP support and how to configure Keystone to integrate with LDAP
  • Learn about one of Keystone's most sought-after featuresβ€”support for federated identity

✦ Subjects


Systems Analysis Design Computer Science Computers Technology LAN Networks Protocols APIs Networking Cloud Computing Network Administration Disaster Recovery Email Linux UNIX Storage Retrieval Windows Software Development Testing Engineering Programming New Used Rental Textbooks Specialty Boutique


πŸ“œ SIMILAR VOLUMES


Identity, Authentication, and Access Man
✍ Steve Martinelli, Henry Nash, Brad Topol πŸ“‚ Library πŸ“… 2015 πŸ› O'Reilly Media 🌐 English

Keystone - OpenStack's Identity service - provides secure controlled access to a cloud's resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access. Whether the cloud is private, public, or

Mastering OpenStack: Design, deploy, and
✍ Omar Khedher πŸ“‚ Library πŸ“… 2015 πŸ› Packt Publishing 🌐 English

This comprehensive guide will help you to choose the right practical option and make strategic decisions about the OpenStack cloud environment to fit your infrastructure in production. At the start, this book will explain the OpenStack core architecture. You will soon be shown how to create your ow

Identity Attack Vectors: Implementing An
✍ Morey J. Haber, Darran Rolls πŸ“‚ Library πŸ“… 2020 πŸ› Apress 🌐 English

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how t

Extending OpenStack: Leverage extended O
✍ Omar Khedher πŸ“‚ Library πŸ“… 2018 πŸ› Packt Publishing 🌐 English

<p><b>Discover new opportunities to empower your private cloud by making the most of the OpenStack universe</b></p><h4>Key Features</h4><ul><li>This practical guide teaches you how to extend the core functionalities of OpenStack</li><li>Discover OpenStack's flexibility by writing custom applications

Extending OpenStack: Leverage extended O
✍ Omar Khedher πŸ“‚ Library πŸ“… 2018 πŸ› Packt Publishing 🌐 English

<p><b>Discover new opportunities to empower your private cloud by making the most of the OpenStack universe</b></p><h4>Key Features</h4><ul><li>This practical guide teaches you how to extend the core functionalities of OpenStack</li><li>Discover OpenStack's flexibility by writing custom applications

Securing the Perimeter: Deploying Identi
✍ Michael Schwartz πŸ“‚ Library πŸ“… 2019 πŸ› Apress 🌐 English

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack. The most common