Train Project Update Colleen Murphy (cmurphy/@cmurpheus) Lance - - PowerPoint PPT Presentation

train project update
SMART_READER_LITE
LIVE PREVIEW

Train Project Update Colleen Murphy (cmurphy/@cmurpheus) Lance - - PowerPoint PPT Presentation

Train Project Update Colleen Murphy (cmurphy/@cmurpheus) Lance Bragstad (lbragstad/@LanceBragstad) What is keystone ? Contributions in Stein Achievements in Stein Plans for Train Looking ahead Cross-project initiatives How to participate Related


slide-1
SLIDE 1

Train Project Update

Colleen Murphy (cmurphy/@cmurpheus) Lance Bragstad (lbragstad/@LanceBragstad)

slide-2
SLIDE 2

What is keystone? Contributions in Stein Achievements in Stein Plans for Train Looking ahead Cross-project initiatives How to participate Related sessions and talks

slide-3
SLIDE 3

What is keystone?

implementation of the OpenStack Identity API shared service for authentication and authorization broker between OpenStack and other identity services discovery service

slide-4
SLIDE 4

What is keystone?

implementation of the OpenStack Identity API shared service for authentication and authorization broker between OpenStack and other identity services discovery service

slide-5
SLIDE 5

What is keystone?

implementation of the OpenStack Identity API shared service for authentication and authorization broker between OpenStack and other identity services discovery service

slide-6
SLIDE 6

What is keystone?

implementation of the OpenStack Identity API shared service for authentication and authorization broker between OpenStack and other identity services discovery service

slide-7
SLIDE 7

What is keystone?

implementation of the OpenStack Identity API shared service for authentication and authorization broker between OpenStack and other identity services discovery service

slide-8
SLIDE 8

What does keystone do?

supplies identity information to end users and services protects services from unauthenticated access facilitates collaboration through multi-tenancy emits event notifications for auditing

slide-9
SLIDE 9

What does keystone do?

supplies identity information to end users and services protects services from unauthenticated access facilitates collaboration through multi-tenancy emits event notifications for auditing

slide-10
SLIDE 10

What does keystone do?

supplies identity information to end users and services protects services from unauthenticated access facilitates collaboration through multi-tenancy emits event notifications for auditing

slide-11
SLIDE 11

What does keystone do?

supplies identity information to end users and services protects services from unauthenticated access facilitates collaboration through multi-tenancy emits event notifications for auditing

slide-12
SLIDE 12

What does keystone do?

supplies identity information to end users and services protects services from unauthenticated access facilitates collaboration through multi-tenancy emits event notifications for auditing

slide-13
SLIDE 13

Contributions in Stein

707 commits 73%, 85 committers 3% 3724 reviews 42%, 124 reviewers 1%, 10 core reviewers 33% 194 bug reports 59%, 195 bugs closed 91%

slide-14
SLIDE 14

Generated with https://github.com/lbragstad/openstack-release-summarizer

slide-15
SLIDE 15

Achievements in Stein

MFA Receipts JWS tokens domain level quota limits system scope APIs read-only role

slide-16
SLIDE 16

Achievements in Stein

MFA Receipts JWS tokens domain level quota limits system scope APIs read-only role

slide-17
SLIDE 17

Achievements in Stein

MFA Receipts JWS tokens domain level quota limits system scope APIs read-only role

slide-18
SLIDE 18

Achievements in Stein

MFA Receipts JWS tokens domain level quota limits system scope APIs read-only role

slide-19
SLIDE 19

Achievements in Stein

MFA Receipts JWS tokens domain level quota limits system scope APIs read-only role

slide-20
SLIDE 20

Plans for Train

access rules for application credentials renewable application credentials client support for MFA receipts complete system scope policy changes polish read-only role implementation immutable resources

slide-21
SLIDE 21

Plans for Train

access rules for application credentials renewable application credentials client support for MFA receipts complete system scope policy changes polish read-only role implementation immutable resources

slide-22
SLIDE 22

Plans for Train

access rules for application credentials renewable application credentials client support for MFA receipts complete system scope policy changes polish read-only role implementation immutable resources

slide-23
SLIDE 23

Plans for Train

access rules for application credentials renewable application credentials client support for MFA receipts complete system scope policy changes polish read-only role implementation immutable resources

slide-24
SLIDE 24

Plans for Train

access rules for application credentials renewable application credentials client support for MFA receipts complete system scope policy changes polish read-only role implementation immutable resources

slide-25
SLIDE 25

Plans for Train

access rules for application credentials renewable application credentials client support for MFA receipts complete system scope policy changes polish read-only role implementation immutable resources

slide-26
SLIDE 26

Looking ahead

federation and edge improvements identity provider proxy hierarchical enforcement models for unified limits enhance tokenless authentication

slide-27
SLIDE 27

Looking ahead

federation and edge improvements identity provider proxy hierarchical enforcement models for unified limits enhance tokenless authentication

slide-28
SLIDE 28

Looking ahead

federation and edge improvements identity provider proxy hierarchical enforcement models for unified limits enhance tokenless authentication

slide-29
SLIDE 29

Looking ahead

federation and edge improvements identity provider proxy hierarchical enforcement models for unified limits enhance tokenless authentication

slide-30
SLIDE 30

Looking ahead

federation and edge improvements identity provider proxy hierarchical enforcement models for unified limits enhance tokenless authentication

slide-31
SLIDE 31

Cross-project initiatives

adoption of unified limits properly consuming scope types default roles support

slide-32
SLIDE 32

Cross-project initiatives

adoption of unified limits properly consuming scope types default roles support

slide-33
SLIDE 33

Cross-project initiatives

adoption of unified limits properly consuming scope types default roles support

slide-34
SLIDE 34

Cross-project initiatives

adoption of unified limits properly consuming scope types default roles support

slide-35
SLIDE 35

How to participate

irc

#openstack-keystone

email

  • penstack-discuss@lists.openstack.org, tag [keystone]

meetings

Tuesdays at 16:00 UTC in #openstack-meeting-alt

bugs

https://bugs.launchpad.net/keystone

specs

http://specs.openstack.org/openstack/keystone-specs/

roadmap

https://trello.com/b/ClKW9C8x/keystone-train-roadmap

PTG

Thursday-Saturday, room 106

slide-36
SLIDE 36

Forum sessions

Keystone Application Credentials: Status and Planning

Monday 11:10 Ballroom level 4A

Keystone Operator Feedback

Monday 12:00 Ballroom level 4A

Increasing API accessibility with granular policy and default roles

Wednesday 16:20 Ballroom level 4A

Unified limits update and migration

Wednesday 17:10 Ballroom level 4B

slide-37
SLIDE 37

Presentations

You can't make a (Denver) omelette without breaking eggs: Using OpenStack policies for great good

Monday 12:00 Meeting Room Level 401/402

Access Control Policy Hands On Lab

Monday 15:50 Meeting Room Level 4D

Bridging Clouds with Keystone to Keystone Federation

Wednesday 11:40 Meeting Room Level 501/502

Keystone JWS Tokens: Past, Present, and Future

Wednesday 11:40 Meeting Room Level 505/506

Keystone - Project Onboarding

Wednesday 13:40 Room 406

slide-38
SLIDE 38