Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
WHAT'S IN THIS CHAPTER?
At this point, you have an understanding of why cloud computing is important to application developers, and a general overview of OpenStack. In this chapter, you will learn the core services in more detail. These are the services most critical to running an application-compute, network, and storage. You will also learn about the management services to make those possible, such as the identity service, which allows you to authenticate in order to create your applications.
Sometimes, it may seem that the descriptions in this chapter go into more detail than you need to run an application. However, you can think of these features as tools and building blocks. You need to have a solid understanding of what is possible, so you can see new ways to build flexible, scalable, and robust applications (see Figure 2.1).
Figure 2.1
The identity service within OpenStack, named Keystone, is responsible for authentication, authorization and accounting (AAA) and currently implements and provides the OpenStack Identity API.
The main goal of this identity service is to process and validate authentication and authorization requests, then return an "authentication token," which is used to authenticate the user against the APIs and can be used to contact the other services of an OpenStack infrastructure. These services can be discovered using the catalog returned in the authentication response (detailed later in this chapter).
Keystone currently implements two versions of the Identity API (v2, v3). The second version has been used for years and is still mainly used today in the different libraries and clients supporting OpenStack. The third version is quite recent and provides a more pluggable and flexible design, allowing using multiple authentication mechanisms (the original "password" method, but moreover well-known and used mechanisms, such as OAuth or SAML2), and the ability to combine these methods in a single request.
This last Identity API has a multi-tenant design and has simple resources:
All of these resources can be managed using the Identity Admin API, which is available as a create, read, update, and delete (CRUD) RESTful API.
The authentication against the different OpenStack services is based on tokens provided by the identity service (Keystone) or configured in the service itself (e.g. admin tokens).
A token provided by an identity service is an arbitrary string that contains the User identity and optionally an authorization called scope. The authorization attached to this token grants access to a Project or a Domain, allowing you to access Project or Domain-related resources.
You can easily create a token using the Identity API with the method POST /auth/tokens with a user identity and the wanted scope:
POST /auth/tokens
scope
{ "auth": { "identity": { ... }, "scope": { ... } } }
When requesting a new token, the identity parameter will contain the used authentication mechanisms. Here is an example using password. The unique identifier of the user is used here, however it is possible to use the username if the domain is explicitly specified.
identity
password
{ "auth": { "identity": { "methods": [ "password" ], "password": { "user": { "id": "042042", "password": "secret-password" } } } } }
If specified in the request, the authorization scope must contain the project identifier or the domain identifier.
{ "auth": { "scope": { "project": { "id": "123456" } } } }
If a scope has been provided in the token creation request, the Identity API will return a catalog containing the different OpenStack services that can be used by the user with the token and the roles granted to this user.
catalog
roles
X-Subject-Token: ff00ff84 { "token": { "catalog": [ { "endpoints": [ { "id": "c3ac301342a381b895743659d0956de1", "interface": "public", "region": "RegionOne", "url": "http://my.identity.service:5000" } ], "id": "...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.