Locally managed users are handled slightly differently than users backed by LDAP, which are handled significantly differently than users backed by federation. Available APIs, relevant APIs, and token validation responses all vary. For example, users receive different types of IDs, passwords may or may not be stored in keystone, and in the case of federation, may not be able to receive direct role assignments. Future additional authentication methods pose a risk of complicating things further.
Instead of continuing down this path, we can refactor our user persistence to separate identities from their locally-managed credentials, if any. The result will be a unified experience for both end users and operators.
Use cases:
A consistent user experience. A federated user should have the same user experience as a locally-managed user. For example, federated users should be able to consume local role assignments just like locally-managed users can. Today, federated users can only be mapped into user groups, and receive tokens with larger payloads to accommodate their ephemeral nature.
One user, multiple credentials. In the real world, a single person has multiple means of authenticating themselves. For example, a person might carry a driver’s license, have a passport, and know a secret, such as a credit card verification value (CVV). In terms of OpenStack, a user could have a password in keystone, a private identity provider (such as a corporate LDAP), a public identity provider (such as a social media profile), an X.509 certificate, and an existing account on a remote cloud. If all of these authentication sources are equally valid, then the resulting user and operator experience should not vary based on which is chosen. All of these means of authentications should be tied to the same user identity, rather than resulting in distinct identities.
Note: We discussed the potential future need to tie privileges to authentication methods. This is out-of-scope for this spec, however the spec does not prevent or conflict from this feature being added in the future.
Additionally: Facilitates multi-factor authentication & account linking. With multiple types of credentials tied to the same user identity, users can authenticate themselves using more than one credential at a time. Keystone can then make stronger assertions about the identity of the user and the path to viable multi-factor authentication (MFA) is shortened. Likewise, the proposed changes support linking multiple accounts for the same user to a single account, as well as simplifies auditing around federated users. While this specification does not solve MFA or account linking, the refactoring done for this spec will make the development for those features easier.
We can continue treating federated users as ephemeral. In the long run, that’s either going to result in additional metadata being included in token payloads, ultimately bloating Fernet tokens beyond their intended capacity, or increasingly disparate user experiences depending on the user’s authentication source.
Auditing notifications which made use of federated identity information in tokens will no longer have access to that information, beyond multiple authentication methods presented by v3 tokens. All auditing notifications will effectively refer to a local user identity.
All end users will receive a consistent API experience: that of a locally-managed one.
Developers supporting alternative authentication methods will be able to reference the common user identity, and create shadow records themselves. It’s important to note that existing CRUD APIs will not be impacted; only the backend is being refactored.
With federation being a more viable option, deployers supporting custom code to bootstrap new users with role assignments can take advantage of federated mappings to accomplish the same thing, if they move to federation.
None.
Deployers need to understand the new local user persistence requirements, even in the case of federation.
Documentation that suggests that federated users cannot receive local role assignments needs to be revised.