Identity, Authentication, and Access Management in OpenStack

Implementing and Deploying Keystone

Nonfiction, Computers, Programming, Systems Analysis, Advanced Computing, Information Technology, Software Development
Cover of the book Identity, Authentication, and Access Management in OpenStack by Steve  Martinelli, Henry Nash, Brad Topol, O'Reilly Media
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Steve Martinelli, Henry Nash, Brad Topol ISBN: 9781491940785
Publisher: O'Reilly Media Publication: December 8, 2015
Imprint: O'Reilly Media Language: English
Author: Steve Martinelli, Henry Nash, Brad Topol
ISBN: 9781491940785
Publisher: O'Reilly Media
Publication: December 8, 2015
Imprint: O'Reilly Media
Language: English

Keystone—OpenStack's Identity service—provides secure controlled access to a cloud’s resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.

Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layer—as well as key practices for safeguarding your cloud's ongoing security.

  • Learn about Keystone's fundamental capabilities for providing Identity, Authentication, and Access Management
  • Perform basic Keystone operations, using concrete examples and the latest version (v3) of Keystone's Identity API
  • Understand Keystone's unique support for multiple token formats, including how it has evolved over time
  • Get an in-depth explanation of Keystone's LDAP support and how to configure Keystone to integrate with LDAP
  • Learn about one of Keystone's most sought-after features—support for federated identity
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Keystone—OpenStack's Identity service—provides secure controlled access to a cloud’s resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.

Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layer—as well as key practices for safeguarding your cloud's ongoing security.

More books from O'Reilly Media

Cover of the book Prototyping for Designers by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book Asterisk: The Future of Telephony by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book sendmail by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book Hack and HHVM by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book flex & bison by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book Mac OS X for Unix Geeks (Leopard) by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book Oracle SQL*Plus: The Definitive Guide by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book Programming 3D Applications with HTML5 and WebGL by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book Real-Time Communication with WebRTC by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book Becoming Functional by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book Better, Faster, Lighter Java by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book Programming WCF Services by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book FrontPage 2003: The Missing Manual by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book C++ In a Nutshell by Steve  Martinelli, Henry Nash, Brad Topol
Cover of the book Photoshop Elements 3: The Missing Manual by Steve  Martinelli, Henry Nash, Brad Topol
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy