docs/doc/source/security/kubernetes/configure-the-keystone-token-expiration-time.rst
Ron Stone f125a8b892 Remove spurious escapes (r8,dsR8)
This change addresses a long-standing issue in rST documentation imported from XML.
That import process added backslash escapes in front of various characters. The three
most common being '(', ')', and '_'.
These instances are removed.

Signed-off-by: Ron Stone <ronald.stone@windriver.com>
Change-Id: Id43a9337ffcd505ccbdf072d7b29afdb5d2c997e
2023-03-01 11:19:04 +00:00

1.4 KiB

Configure the Keystone Token Expiration Time

You can change the default Keystone token expiration setting. This may be required to provide sustained access for operations that take more than an hour.

By default, the Keystone token expiration time is set to 3600 seconds (1 hour). This is the amount of time a token remains valid. The new setting must be between 3600 seconds and 14400 seconds.

  1. On the active controller, become the Keystone admin user.

    $ source /etc/platform/openrc
  2. Ensure that the token_expiration parameter is defined for the identity service.

    $ system service-parameter-list | grep token_expiration
    
    | 712e4a45-777c-4e83-9d56-5042cde482f7 | identity | config | token_expiration | 3600
  3. Modify the service parameter using the following command:

    $ system service-parameter-modify identity config token_expiration=7200
  4. Apply the configuration change.

    $ system service-parameter-apply identity
    
    Applying identity service parameters

    Allow a few minutes for the change to take an effect.