Merge "Fix OpenStack-Ansible refs w/o hyphen"
This commit is contained in:
commit
2de197517f
@ -1,4 +1,4 @@
|
||||
`Home <index.html>`__ OpenStack Ansible Installation Guide
|
||||
`Home <index.html>`__ OpenStack-Ansible Installation Guide
|
||||
|
||||
Appendix C. Minor Upgrades
|
||||
--------------------------
|
||||
|
@ -1,4 +1,4 @@
|
||||
`Home <index.html>`__ OpenStack Ansible Installation Guide
|
||||
`Home <index.html>`__ OpenStack-Ansible Installation Guide
|
||||
|
||||
Appendix E. Using PLUMgrid Neutron Plugin
|
||||
-----------------------------------------
|
||||
|
@ -1,4 +1,4 @@
|
||||
`Home <index.html>`__ OpenStack Ansible Installation Guide
|
||||
`Home <index.html>`__ OpenStack-Ansible Installation Guide
|
||||
|
||||
Appendix D. Tips and Tricks
|
||||
---------------------------
|
||||
|
@ -1,4 +1,4 @@
|
||||
`Home <index.html>`__ OpenStack Ansible Installation Guide
|
||||
`Home <index.html>`__ OpenStack-Ansible Installation Guide
|
||||
|
||||
Configure Active Directory Federation Services (ADFS) 3.0 as an identity provider
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
@ -1,4 +1,4 @@
|
||||
`Home <index.html>`__ OpenStack Ansible Installation Guide
|
||||
`Home <index.html>`__ OpenStack-Ansible Installation Guide
|
||||
|
||||
Configure Identity Service (keystone) as a federated identity provider
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
@ -1,4 +1,4 @@
|
||||
`Home <index.html>`__ OpenStack Ansible Installation Guide
|
||||
`Home <index.html>`__ OpenStack-Ansible Installation Guide
|
||||
|
||||
Configure Identity Service (keystone) Domain-Project-Group-Role mappings
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
@ -1,9 +1,9 @@
|
||||
`Home <index.html>`__ OpenStack Ansible Installation Guide
|
||||
`Home <index.html>`__ OpenStack-Ansible Installation Guide
|
||||
|
||||
Identity Service (keystone) service provider background
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
In openstack-ansible (OSA) the Identity Service (keystone) is set up to
|
||||
In OpenStack-Ansible (OSA) the Identity Service (keystone) is set up to
|
||||
use Apache with mod_wsgi. The additional configuration of
|
||||
keystone as a federation service provider adds Apache mod_shib
|
||||
and configures it to respond to specific locations requests
|
||||
|
@ -1,4 +1,4 @@
|
||||
`Home <index.html>`__ OpenStack Ansible Installation Guide
|
||||
`Home <index.html>`__ OpenStack-Ansible Installation Guide
|
||||
|
||||
Configure Identity Service (keystone) as a federated service provider
|
||||
---------------------------------------------------------------------
|
||||
|
@ -1,4 +1,4 @@
|
||||
`Home <index.html>`__ OpenStack Ansible Installation Guide
|
||||
`Home <index.html>`__ OpenStack-Ansible Installation Guide
|
||||
|
||||
Identity Service to Identity Service federation example use-case
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
@ -1,4 +1,4 @@
|
||||
`Home <index.html>`__ OpenStack Ansible Installation Guide
|
||||
`Home <index.html>`__ OpenStack-Ansible Installation Guide
|
||||
|
||||
Using Identity Service to Identity Service federation
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
@ -42,7 +42,7 @@ Unfortunately, many of the steps above involve manually sending API requests.
|
||||
The infrastructure for the command line utilities to perform all these steps
|
||||
for the user does not yet exist.
|
||||
|
||||
To simplify the task of obtaining access to a SP cloud, OpenStack Ansible provides a script that wraps the above steps. The script is called ``federated-login.sh`` and is
|
||||
To simplify the task of obtaining access to a SP cloud, OpenStack-Ansible provides a script that wraps the above steps. The script is called ``federated-login.sh`` and is
|
||||
used as follows::
|
||||
|
||||
# ./scripts/federated-login.sh -p project [-d domain] sp_id
|
||||
|
@ -1,4 +1,4 @@
|
||||
`Home <index.html>`__ OpenStack Ansible Installation Guide
|
||||
`Home <index.html>`__ OpenStack-Ansible Installation Guide
|
||||
|
||||
Configuring Identity Service federation (optional)
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
@ -79,7 +79,7 @@ in your ``/etc/openstack_deploy/user_variables.yml``:
|
||||
Securing HAProxy communication with SSL certificates
|
||||
####################################################
|
||||
|
||||
The openstack-ansible project provides the ability to secure HAProxy
|
||||
The OpenStack-Ansible project provides the ability to secure HAProxy
|
||||
communications with self-signed or user-provided SSL certificates.
|
||||
|
||||
Refer to `Securing services with SSL certificates`_ for available configuration
|
||||
|
@ -9,7 +9,7 @@ Customizing the Horizon deployment is done within
|
||||
Securing Horizon communication with SSL certificates
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
The openstack-ansible project provides the ability to secure Horizon
|
||||
The OpenStack-Ansible project provides the ability to secure Horizon
|
||||
communications with self-signed or user-provided SSL certificates.
|
||||
|
||||
Refer to `Securing services with SSL certificates`_ for available configuration
|
||||
|
@ -9,7 +9,7 @@ Customizing the Keystone deployment is done within
|
||||
Securing Keystone communication with SSL certificates
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
The openstack-ansible project provides the ability to secure Keystone
|
||||
The OpenStack-Ansible project provides the ability to secure Keystone
|
||||
communications with self-signed or user-provided SSL certificates.
|
||||
|
||||
Refer to `Securing services with SSL certificates`_ for available configuration
|
||||
|
@ -4,7 +4,7 @@ Configuring RabbitMQ (optional)
|
||||
-------------------------------
|
||||
|
||||
RabbitMQ provides the messaging broker for various OpenStack services. The
|
||||
openstack-ansible project configures a plaintext listener on port 5672 and
|
||||
OpenStack-Ansible project configures a plaintext listener on port 5672 and
|
||||
a SSL/TLS encrypted listener on port 5671.
|
||||
|
||||
Customizing the RabbitMQ deployment is done within
|
||||
@ -13,7 +13,7 @@ Customizing the RabbitMQ deployment is done within
|
||||
Add a TLS encrypted listener to RabbitMQ
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
The openstack-ansible project provides the ability to secure RabbitMQ
|
||||
The OpenStack-Ansible project provides the ability to secure RabbitMQ
|
||||
communications with self-signed or user-provided SSL certificates. Refer to
|
||||
`Securing services with SSL certificates`_ for available configuration
|
||||
options.
|
||||
|
@ -8,7 +8,7 @@ deployment is highly recommended in the `OpenStack Security Guide`_.
|
||||
|
||||
.. _OpenStack Security Guide: http://docs.openstack.org/security-guide/secure-communication.html
|
||||
|
||||
The openstack-ansible project currently offers the ability to configure SSL
|
||||
The OpenStack-Ansible project currently offers the ability to configure SSL
|
||||
certificates for secure communication with the following services:
|
||||
|
||||
* HAProxy
|
||||
@ -32,7 +32,7 @@ Self-signed certificates
|
||||
Self-signed certificates make it easy to get started quickly and they ensure
|
||||
data is encrypted in transit, but they don't provide a high level of trust
|
||||
for highly secure environments. The use of self-signed certificates is
|
||||
currently the default in openstack-ansible. When self-signed certificates are
|
||||
currently the default in OpenStack-Ansible. When self-signed certificates are
|
||||
being used, certificate verification must be disabled using the following
|
||||
user variables depending on your configuration. These variables can be added
|
||||
in ``/etc/openstack_deploy/user_variables.yml``.
|
||||
|
@ -1,9 +1,9 @@
|
||||
`Home <index.html>`__ OpenStack Ansible Installation Guide
|
||||
`Home <index.html>`__ OpenStack-Ansible Installation Guide
|
||||
|
||||
Security
|
||||
--------
|
||||
|
||||
The openstack-ansible project provides several security features for
|
||||
The OpenStack-Ansible project provides several security features for
|
||||
OpenStack deployments. This section of documentation covers some of those
|
||||
features and how they can benefit deployers of various sizes.
|
||||
|
||||
@ -24,7 +24,7 @@ specific limits and policies around what resources a particular application
|
||||
can access. Any activity outside the allowed policies is denied at the kernel
|
||||
level.
|
||||
|
||||
In openstack-ansible, AppArmor profiles are applied that limit the actions
|
||||
In OpenStack-Ansible, AppArmor profiles are applied that limit the actions
|
||||
that each LXC container may take on a system. This is done within the
|
||||
`lxc_hosts role`_.
|
||||
|
||||
@ -37,7 +37,7 @@ Encrypted communication
|
||||
~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
Data is encrypted while in transit between some OpenStack services in
|
||||
openstack-ansible deployments. Not all communication between all services is
|
||||
OpenStack-Ansible deployments. Not all communication between all services is
|
||||
currently encrypted. For more details on what traffic is encrypted, and how
|
||||
to configure SSL certificates, refer to the documentation section titled
|
||||
`Securing services with SSL certificates`_.
|
||||
|
Loading…
x
Reference in New Issue
Block a user