Skip to content

Commit 0cee4f1

Browse files
committed
clarified note
1 parent 35e157f commit 0cee4f1

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

docs_user/modules/con_identity-service-authentication.adoc

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,15 @@
44
= {identity_service} authentication
55

66
[role="_abstract"]
7-
If you have custom policies enabled, contact Red Hat Support before adopting a {OpenStackPreviousInstaller} OpenStack deployment. You must complete the following steps for adoption:
7+
If you have custom policies enabled, complete the following steps for adoption:
88

99
. Remove custom policies.
1010
. Run the adoption.
1111
. Re-add custom policies by using the new SRBAC syntax.
1212

13+
[IMPORTANT]
14+
Red Hat does not support customized roles or policies. Syntax errors or misapplied authorization can negatively impact security or usability. If you need customized roles or policies in your production environment, contact Red Hat support for a support exception before you begin the adoption.
15+
1316
After you adopt a {OpenStackPreviousInstaller}-based OpenStack deployment to a {rhos_long_noacro} deployment, the {identity_service} performs user authentication and authorization by using Secure RBAC (SRBAC). If SRBAC is already enabled, then there is no change to how you perform operations. If SRBAC is disabled, then adopting a {OpenStackPreviousInstaller}-based OpenStack deployment might change how you perform operations due to changes in API access policies.
1417

1518
For more information on SRBAC, see link:{defaultURL}/performing_security_operations/assembly_srbac-in-rhoso_performing-security-services#assembly_srbac-in-rhoso_performing-security-services[Secure role based access control in Red Hat OpenStack Services on OpenShift] in _Performing security operations_.

0 commit comments

Comments
 (0)