Juju Charm - Keystone OpenID Connect
f93b4451fb
This change introduces the configuration of OAuth to enable auth-openidc which is browser-less. When enable-oauth is set to true (the default) and oidc-auth-verify-jwks-uri is empty, the charm will try use oidc-oauth-introspection-endpoint if set, otherwise the charm will fetch the content at oidc-provider-metadata-url and use the value available at the key introspection_endpoint. |
||
---|---|---|
src | ||
templates | ||
tests | ||
unit_tests | ||
.gitignore | ||
.jujuignore | ||
.stestr.conf | ||
.zuul.yaml | ||
build-requirements.txt | ||
charmcraft.yaml | ||
config.yaml | ||
LICENSE | ||
metadata.yaml | ||
osci.yaml | ||
README.md | ||
rename.sh | ||
requirements.txt | ||
test-requirements.txt | ||
tox.ini |
Overview
This subordinate charm provides a way to integrate a Open ID Connect based identity provider with Keystone using mod_auth_openidc. Apache operates as a OpenID Connect Relaying Party towards an OpenID Connect Provider.
Usage
Use this charm with the Keystone charm:
juju deploy keystone
juju deploy openstack-dashboard
juju deploy keystone-openidc
juju add-relation keystone:keystone-fid-service-provider keystone-openidc:keystone-fid-service-provider
juju add-relation openstack-dashboard:websso-fid-service-provider keystone-openidc:websso-fid-service-provider
In a bundle:
applications:
keystone-openidc:
charm: ch:keystone-openid
num_units: 0
relations:
- - keystone:keystone-fid-service-provider
- keystone-openidc:keystone-fid-service-provider
Prerequisites
Bugs
Please report bugs on Launchpad.
For general charm questions refer to the OpenStack Charm Guide.