Note
This is a continuation of the remaining work that began in the Mitaka release. Only the summary is reproduced here for convenience.
Locally managed users are handled slightly differently than users backed by LDAP, which are handled significantly differently than users backed by federation. Available APIs, relevant APIs, and token validation responses all vary. For example, users receive different types of IDs, passwords may or may not be stored in keystone, and in the case of federation, may not be able to receive direct role assignments. Future additional authentication methods pose a risk of complicating things further.
Instead of continuing down this path, we can refactor our user persistence to separate identities from their locally-managed credentials, if any. The result will be a unified experience for both end users and operators.
See the Mitaka spec (Problem Description).
See the Mitaka spec (Proposed Change) for the originally-proposed changes and additional detail.
See the Mitaka spec (Alternatives).
See the Mitaka spec (Security Impact).
See the Mitaka spec (Notifications Impact).
See the Mitaka spec (Other End User Impact).
See the Mitaka spec (Performance Impact).
See the Mitaka spec (Other Deployer Impact).
See the Mitaka spec (Developer Impact).
See the Mitaka spec (Dependencies).
See the Mitaka spec (Documentation Impact).
See the Mitaka spec (References).