You can integrate VMware Integrated OpenStack with any third-party identity provider solution that uses the Security Association Markup Language (SAML) 2.0 protocol.
If you want to integrate VMware Integrated OpenStack with VMware Identity Manager using SAML 2.0, see Configure VMware Identity Manager Federation.
Prerequisites
- Deploy your identity provider solution and determine the location of its metadata file.
- Ensure that the VMware Integrated OpenStack controller node can access the FQDN of the identity provider solution.
- Create a mapping file in JSON format and save it on the OpenStack Management Server. For more information, see Mapping Combinations in the OpenStack documentation.
- In your mapping file, do not use
federated
as the domain name. This name is reserved by Keystone. - Create an SAML attribute mapping file in JSON format and save it on the OpenStack Management Server. Use the following structure:
[ { "name": "attribute-1", "id": "id-1" }, { "name": "attribute-2", "id": "id-2" }, ... ]
Procedure
Results
Example: Example: Integrating VMware Integrated OpenStack with Active Directory Federation Services
The following procedure implements identity federation between VMware Integrated OpenStack and Active Directory Federation Services (AD FS). In this example, the public virtual IP address of the VMware Integrated OpenStack deployment is 192.0.2.160 and the AD FS role has been added to a Windows Server virtual machine located at adfs.example.com.
- In AD FS, add a relying party trust for VMware Integrated OpenStack.
- In AD FS Management, select .
- Click Start.
- Select Enter data about the relying party manually and click Next.
- Enter OpenStack for the display name and click Next.
- Select AD FS profile and click Next.
- Click Next.
- Select Enable support for the SAML 2.0 WebSSO protocol.
- Enter https://192.0.2.160:5000/saml for the relying party URL and click Next.
- Enter https://192.0.2.160:5000/saml for the relying party trust identifier, click Add, and click Next.
- Select I do not want to configure multi-factor authentication and click Next.
- Select Permit all users to access this relying party and click Next.
- Click Next, select Edit Claim Rules, and click Close.
- Click Add Rule....
- Select Pass Through or Filter an Incoming Claim and click Next.
- Enter UPN passthrough for the rule name and select UPN for the incoming claim type.
- Select Pass through all claim values and click Finish
- Log in to the OpenStack Management Server as
viouser
. - Write the following information to a file named mapping.json.
[ { "local": [ { "user": { "name": "{0}" }, "group": { "domain": { "name": "adfs-users" }, "name": "Federated Users" } } ], "remote": [ { "type": "upn" } ] } ]
- Write the following information to a file named attribute.json.
[ { "name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn", "id": "upn" } ]
- Add AD FS as an identity provider.
sudo viocli federation identity-provider add --type saml2
- Enter the information as prompted.
Identity provider name []: adfs Identity provider display name (for Horizon) []: Active Directory Federation Services Description []: ADFS deployment Do you wish to use URL or local file for IdP metadata? (url, file) [url]: url IdP metadata URL []: https://adfs.example.com/federationmetadata/2007-06/federationmetadata.xml Do not verify certificates when establishing TLS/SSL connections [False]: false Do you wish to use a static file or template file for mapping rules? (static, template) [static]: static Enter the local path of mapping rules file: mapping.json Enter the name of the domain that federated users associate with [Default]: adfs-users Enter the name to the groups that federated users associate with (separated by commas ",") []: Federated Users Do you wish to use a static file or template file for attribute mapping? (static, template) [static]: static Enter the local path of attribute mapping file: attribute.json
- Deploy the updated identity configuration.
sudo viocli identity configure
After the configuration is deployed, open the VMware Integrated OpenStack dashboard. You can now select the AD FS identity provider and log in as a federated user.