You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Standards/scs-03XX-v1-standard-roles.md
-9Lines changed: 0 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -121,15 +121,6 @@ Using the alternative configurations would streamline Octavia's policies with th
121
121
However, both of the alternative policy files that omit the Octavia-specific roles currently state "The [oslo_policy]`enforce_scope` and `enforce_new_defaults` must be `True`.".
122
122
This would require the new defaults and scope-enforcing options.
123
123
124
-
### Key Manager Role Model
125
-
126
-
The OpenStack policy defaults for the Key Manager service Barbican establish service-specific roles as documented above.
127
-
Unless the new scoping defaults (`enforce_new_defaults`) are used, this leads to users possessing the generic "member" role being unable to access the Key Manager API to create and manage secrets.
128
-
This in turn renders encryption features like the volume encryption of OpenStack's volume service unusable for customers unless the corresponding users are assigned the Barbican-specific "creator" role in projects additionally.
129
-
This creates unnecessary management overhead on the CSP side and ambiguity for users since the role is only useful in Barbican but its name does not communicate this.
130
-
131
-
To improve user experience and make the encryption features easily accessible, this standard should demand using the new role model and scoping defaults for the Key Manager API.
132
-
133
124
### Inclusion of the "manager" role
134
125
135
126
The current RBAC rework in upstream OpenStack[^2] describes a "project-manager" persona utilizing a new "manager" role on project scope to perform more privileged operations than "member" (see "Phase 3" of the document).
0 commit comments