@@ -34,20 +34,32 @@ Otherwise, ``cASO`` will not be able to get the usages and will fail.
34
34
In order to do so, we are going to setup a new role ``accounting `` a new user
35
35
``accounting ``, adding it to each of the projects with that role::
36
36
37
- openstack role create accounting
38
37
openstack user create --password <password> accounting
39
38
# For each of the projects, add the user with the accounting role
40
- openstack role add --user accounting --project <project> accounting
39
+ openstack role add --user accounting --project <project> reader
40
+
41
+ Moreover, if you wish to gather the list of projects that ``cASO `` should use directly
42
+ from OpenStack, you need to grant the user the role reader with a system scope of
43
+ ``all ``::
44
+
45
+ openstack role add --system all --user accounting reader
41
46
42
47
Policy modifications
43
- --------------------
44
- The accounting user needs access to Keystone so as to extract the users
45
- information. In this case, we can can grant the user just the rights for
46
- listing the users adding the appropriate rules in your policy configuration.
48
+ ------------------------
49
+
50
+ .. important :: No policy modifications are needed
51
+
52
+ The following policy modifications are just shown here for reference, if you wish to
53
+ use a different role. You do not need to use them.
54
+
55
+ If you use the role ``reader `` as configured above, you do not need to configure
56
+ anything else in the policy. However, if you wish to use a different role mapping, the
57
+ accounting user needs access to Keystone so as to extract the users information.
47
58
Depending on your configuration, you need to modify the JSON policy file
48
59
(``/etc/keystone/policy.json ``) or the YAML policy file (``/etc/keystone/policy-yaml ``).
49
- The modifications in the policy depend on the Keystone version, please ensure
50
- that you are applying the correct changes as listed in the following table.
60
+ The modifications in the policy depend on the Keystone version, please ensure that you
61
+ are applying the correct changes as listed in the following table. In the example show,
62
+ we are using a dedicated role ``accounting ``.
51
63
52
64
+-------------+------------------------------------------------------------------------------+
53
65
| OpenStack | Policy contents |
@@ -95,7 +107,7 @@ to specify the correct mapping in each of the projects properties. The name of t
95
107
property that will be used is defined in the ``vo_property `` configuration option, and
96
108
defaults to ``accounting:VO ``, therefore you can configure it as follows::
97
109
98
- openstack project set --property acconting :VO=<VO FQAN> <project id>
110
+ openstack project set --property accounting :VO=<VO FQAN> <project id>
99
111
100
112
cASO configuration
101
113
==================
0 commit comments