Skip to content

Commit 1158ddd

Browse files
xekklgill
andauthored
Update docs_user/modules/proc_adopting-the-identity-service.adoc
Co-authored-by: Katie Gilligan <[email protected]>
1 parent 67bec5e commit 1158ddd

File tree

1 file changed

+6
-14
lines changed

1 file changed

+6
-14
lines changed

docs_user/modules/proc_adopting-the-identity-service.adoc

Lines changed: 6 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -135,20 +135,12 @@ $ oc create secret generic keystone-domains \
135135
-n <namespace> \
136136
--from-file=<keystone.DOMAIN_NAME.conf>
137137
----
138-
139-
After creating the secret, you would typically remove the local configuration file if it's no longer needed or store it securely.
140-
141-
IMPORTANT: The name of the file provided to `--from-file` (e.g., `keystone.DOMAIN_NAME.conf`) is critical. Keystone uses this filename to map incoming authentication requests for a domain to the correct LDAP configuration. Ensure `DOMAIN_NAME` matches the name of the domain you are configuring in Keystone.
142-
143-
If you have multiple LDAP domains, create a configuration file for each (e.g., `keystone.DOMAIN_ONE.conf`, `keystone.DOMAIN_TWO.conf`). Then, create the secret with all files:
144-
[source,bash]
145-
----
146-
oc create secret generic keystone-domains \
147-
-n <namespace> \
148-
--from-file=keystone.conf.ldap.DOMAIN_ONE \
149-
--from-file=keystone.conf.ldap.DOMAIN_TWO
150-
----
151-
138+
+
139+
* Replace `<namespace>` with the namespace where your {identity_service} is deployed.
140+
* Replace `<keystone.DOMAIN_NAME.conf>` with the name of your local configuration file. If applicable, include additional configuration files by using the `--from-file` option. After creating the secret, you can remove the local configuration file if it is no longer needed, or store it securely.
141+
+
142+
[IMPORTANT]
143+
The name of the file that you provide to `--from-file`, for example `keystone.DOMAIN_NAME.conf`, is critical. The {identity_service} uses this filename to map incoming authentication requests for a domain to the correct LDAP configuration. Ensure that `DOMAIN_NAME` matches the name of the domain you are configuring in the {identity_service}.
152144

153145
.Patch the OpenStackControlPlane CR
154146

0 commit comments

Comments
 (0)