Friday, 2024-02-16

opendevreviewTatsuya Hayashino proposed openstack/keystoneauth master: Output verification_uri_complete as stderr  https://review.opendev.org/c/openstack/keystoneauth/+/90777501:39
opendevreviewTatsuya Hayashino proposed openstack/keystoneauth master: Output verification_uri_complete as stderr  https://review.opendev.org/c/openstack/keystoneauth/+/90777501:53
*** mhen_ is now known as mhen02:57
opendevreviewAyumu Ueha proposed openstack/keystonemiddleware master: Add FT for External OAuth2.0 Server Support  https://review.opendev.org/c/openstack/keystonemiddleware/+/89991104:15
opendevreviewTatsuya Hayashino proposed openstack/keystoneauth master: Output verification_uri_complete by logger  https://review.opendev.org/c/openstack/keystoneauth/+/90777505:54
WJeffs7Morning, I was wondering just a simple question, is an application credential created by a user with a "member" role tied to a project or that user? So on the user being removed the application ID is removed?10:38
gtemawjeffs7 - yes. Application credentials are tied to the user and are dropped with user being deleted10:39
WJeffs7gtema - what is the best practise around creating a project application account/ID for some automation procedures?  Are people creating manual accounts for this?10:41
gtemaapplication credentials is still a best choice. What you mentioned is a safety measure to prevent people leaving company continue using app creds10:42
gtemaof course you are also free to create "regular" machine accounts10:42
gtemabut that would eventually bite on the password expiration rules10:43
gtemaand MFA10:43
WJeffs7indeed, for my side its just about advising them currently how to do it better, and their reply is if X leaves we loose our application creds - so how do we maintain that, so they want local accounts.....10:44
gtemabefore person leaves the company new creds must be created by staying user10:44
WJeffs7this is exactly my feelings too, its part of product handover procedure.10:45
gtemaright10:45
WJeffs7An application ID can't be migrated between users, and should be recreated with the new user10:46
gtemaright - a new creds must be created10:47
WJeffs7Perfect confirmed exactly what I was thinking and recommending :) Thanks10:47
gtemawelcom10:47
*** tobias-urdin7 is now known as tobias-urdin14:07
nazanHello  I want to do SAML integration in OpenStack keystone.  How can SAML integration be done?  How can I use Application credential and OpenStack CLI with SAML-OpenStack integration?  Environment version openstack:stein keystone: 15.0.1-0ubuntu1~cloud0 keystone federation: SAML Authentication Flows: SAML2.0 WebSSO Apache authentication method: Mellon14:11
gtemanazan - you should read https://docs.openstack.org/keystone/latest/admin/federation/configure_federation.html for details14:14
gtemathe interactive (webbrowser) auth for CLI is not present and not going to be present in the OpenStackClient anytime soon, but I am working currentl on alternative for that14:16
*** tobias-urdin0 is now known as tobias-urdin14:20
nazan Hi gtema I already on below links;  https://docs.openstack.org/keystone/latest/admin/federation/introduction.html https://docs.openstack.org/keystone/pike/advanced-topics/federation/configure_federation.html https://docs.openstack.org/keystone/pike/admin/federated-identity.html https://docs.openstack.org/keystone/pike/advanced-topics/federation/mapping_combinations.html   We can also use a different method instead of websso. Our only purpose i14:35
nazanWe can also use a different method instead of websso. Our only purpose is to use cli and application credentials with SAML.  My env; SP: OpenStack IDP: Cyberark14:36
gtemaapp credentials should not be affected with federation.14:37
gtemathe only thing what I can imagine can go wrong is the user_id in the federated case which you "may use" for searching app creds14:38
nazanI'm currently using both keystone and saml. Keystone local user can create app cred in the same openstack, but saml federation user cannot use both cli and app cred. Error same as Unable to create application credentials14:41
nazanIf you used Saml Federation Openstack, can you send me the config details? I don't know where the mistake . I can also share it with you via e-mail.14:43
gtemathat means that the user your mapping does not allow federated users to create app creds (roles missing)14:44
nazanI created a group in Openstack, then I created a group in Active Directory and allowed the group in the relevant project. When you log in, it is created under the federated user group.  openstack group create test openstack role add --group test --project Train _member_14:46
nazanThe user under the test group can log in to Openstack UI. There is no problem with the UI, there is a problem with the CLI and application cred. If there was an authorization problem, I would not be able to log in from the UI.14:47
jrossergtema: there are a bunch of keystone cli + web browser auth things on GitHub from various organisations who want that enough to make their own extension, is there ever going to be a way to support that directly rather than needing a 3rd party plugin?14:48
jrosserwe are one of those - and use keystone + keycloak + pkce for cli auth flow with a local browser14:49
gtemanot a single one of those mentioned organizations tried to make this part of the OSC itself (not going to blame too much due to current OSC constraints). OSC in its current form will most likely not get the browser based auth anytime soon due to the way how auth is being treated under the hood. As said, I am working on that and there are just too many obstacles around14:54
jrosserI was told that contributions to keystone for this were not welcome because the whole SSO part was to be rewritten14:56
nazanhttps://docs.openstack.org/keystone/stein/admin/federation/configure_federation.html This document says that CLI can be used with ECP, but I have not tested it yet because Cyberark SOAP could not produce metadata. I requested this from the global team. But I couldn't find a solution for application cred.14:56
gtema:) you can read the OAuth2 and OpenIDConnect RFCs and I think you understand how many things are really understood under that. It is just impossible to implement everything properly.14:58
gtemajrosser: wrt federation - we are currently working on making possible to have ephemeral users belong to different domains (and not only to the single one) with support for dynamic roles/projects assignments14:59
jrosserI believe that there have recently been patches for pkce to keystone in other contexts14:59
gtemaand while working on this also looking on how the CLI can be made usable14:59
jrosserthat makes the size of the patch to support cli even smaller15:00
gtemadefinitely not. "Just" enabling web flow in cli is only tiny bit of usability. It just insane without any reasonable caching15:01
jrosserthen I guess I don’t understand what the 3rd party extensions are doing wrong15:02
gtemashow me one pls15:02
nazanHave you used cyberark? cyberark:identity provider15:03
gtemahear it first time ever15:03
nazanDo you think SAML federation supports CLI and app cred?15:04
jrossergtema: an example would be https://github.com/IFCA-Advanced-Computing/keystoneauth-oidc15:04
gtemalooks interesting. If only ever somebody from them has ever raised that to upstream. But anyway there is one problem: every invocation will lead to reauth15:06
gtemaI tried recently to combine all my issues with auth in cli world of OpenStack (https://gtema.github.io/posts/rethinking_openstack_client_auth/)15:07
jrosserthe way we use that is to issue a token15:11
jrosseronce that is done there is no need to re-auth until the token expires and you are free to let loose with terraform or whatever else tooling you need15:12
jrosserthat’s not our code, we use a fork/derivative of that and during the period we were implementing SSO I offered engineering effort to keystone to port the concepts into keystoneauth15:13
jrosserand unless I’m totally missing the point I don’t observe the issues you describe  on GitHub when using tools like ansible15:17
nazan!logs15:32
opendevmeetnazan: Error: "logs" is not a valid command.15:32
nazanlogs15:32
nazan_The chat connection has been lost. How can I access past records?15:36
nazan_HISTORY #channel17:57
tkajinamnazan_, https://meetings.opendev.org/irclogs/%23openstack-keystone/ ?17:59
nazan_I was disconnected. I wrote for saml today, but I can't see past logs.18:05
nazan_thanks tkajinam I see now18:06
nazan_I need to discuss the issue with someone who uses the saml protocol.18:11
opendevreviewDouglas Mendizábal proposed openstack/keystone master: Enable protection jobs  https://review.opendev.org/c/openstack/keystone/+/90923819:36

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!