You can configure LDAP authentication or modify your existing LDAP configuration.
VMware Integrated OpenStack supports SQL plus one or more domains as an identity source, up to a maximum of 10 domains.
Prerequisites
Contact your LDAP administrator or use tools such as ldapsearch or Apache Directory Studio to obtain the correct values for LDAP settings.
Procedure
- In the vSphere Client, select Menu > VMware Integrated OpenStack.
- Click OpenStack Deployments and open the Manage tab.
- On the Settings tab, click Configure Identity Source.
- Click the Add (plus sign) icon to configure a new LDAP source or the Edit (pencil) icon to modify an existing configuration.
- Enter your LDAP configuration.
Option Description Active Directory domain name
Specify the full Active Directory domain name.
Keystone domain name
Enter the Keystone domain name for the LDAP source.
Do not use
default
orlocal
as the Keystone domain.Bind user
Enter the user name to bind to Active Directory for LDAP requests.
Bind password
Enter the password to allow the LDAP client access to the LDAP server.
Domain controllers
(Optional) Enter the IP addresses of one or more domain controllers, separated with commas (,).
If you do not specify a domain controller, VMware Integrated OpenStack will automatically choose an existing Active Directory domain controller.
Site
(Optional) Enter a specific deployment site within your organization to limit LDAP searching to that site.
User Tree DN
(Optional) Enter the search base for users (for example, DC=vmware, DC=com).
In most Active Directory deployments, the top of the user tree is used by default.
User Filter
(Optional) Enter an LDAP search filter for users.
Important:If your directory contains more than 1,000 objects (users and groups), you must apply a filter to ensure that fewer than 1,000 objects are returned.
For more information about filters, see Search Filter Syntax in the Microsoft documentation.
Group tree DN
(Optional) Enter the search base for groups. The LDAP suffix is used by default.
Group filter
(Optional) Enter an LDAP search filter for groups.
LDAP admin user
Enter an LDAP user to act as an administrator for the domain. If you specify an LDAP admin user, the
admin
project will be created in the Keystone domain for LDAP, and this user will be assigned theadmin
role in that project. This user can then log in to Horizon and perform other operations in the Keystone domain for LDAP.If you do not specify an LDAP admin user, you must use the OpenStack command-line interface to add a project to the Keystone domain for LDAP and assign the
admin
role to an LDAP user in that project.You can select the Advanced settings check box to display additional LDAP configuration fields.Option Description Encryption
Select None, SSL, or StartTLS.
Hostname
Enter the hostname of the LDAP server.
Port
Enter the port number to use on the LDAP server.
User objectclass
(Optional) Enter the LDAP object class for users.
User ID attribute
(Optional) Enter the LDAP attribute mapped to the user ID. This value cannot be a multi-valued attribute.
User name attribute
(Optional) Enter the LDAP attribute mapped to the user name.
User mail attribute
(Optional) Enter the LDAP attribute mapped to the user email.
User password attribute
(Optional) Enter the LDAP attribute mapped to the password.
Group objectclass
(Optional) Enter the LDAP object class for groups.
Group ID attribute
(Optional) Enter the LDAP attribute mapped to the group ID.
Group name attribute
(Optional) Enter the LDAP attribute mapped to the group name.
Group member attribute
(Optional) Enter the LDAP attribute mapped to the group member name.
Group description attribute
(Optional) Enter the LDAP attribute mapped to the group description.
- Click Validate to confirm your settings.
- Click OK.
- If you did not specify an LDAP admin user, configure a project and administrator for the Keystone domain for LDAP.
- Log in to the OpenStack Management Server as
viouser
. - Switch to the
root
user and load the cloud administrator credentials file.sudo su - source ~/cloudadmin.rc
- Create a project in the Keystone domain for LDAP.
openstack project create new-project --domain ldap-domain
- Add an LDAP user to the new project.
openstack user set ldap-username --domain ldap-domain --project new-project --project-domain ldap-domain
- In the Keystone domain for LDAP, assign the
admin
role to the LDAP user.openstack role add admin --user ldap-username --user-domain ldap-domain --domain ldap-domain
- In the new project, assign the
admin
role to the LDAP user.openstack role add admin --user ldap-username --user-domain ldap-domain --project new-project --project-domain ldap-domain
- Log in to the OpenStack Management Server as
Results
LDAP authentication is configured on your VMware Integrated OpenStack deployment. You can log in to the VMware Integrated OpenStack dashboard as the LDAP admin user that you specified during configuration.