Skip to content

Commit 80e36d5

Browse files
xekklgill
andauthored
Update docs_user/modules/proc_adopting-the-identity-service.adoc
Co-authored-by: Katie Gilligan <[email protected]>
1 parent a5e5737 commit 80e36d5

File tree

1 file changed

+4
-6
lines changed

1 file changed

+4
-6
lines changed

docs_user/modules/proc_adopting-the-identity-service.adoc

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -96,14 +96,12 @@ This involves two main steps:
9696
2. Patching the `OpenStackControlPlane` custom resource (CR) to enable domain-specific drivers for the {identity_service} and mount a secret that contains the LDAP configurations.
9797

9898

99-
.Create the keystone-domains Secret
100-
101-
This secret stores the actual LDAP configuration files that Keystone will use. Each file within the secret corresponds to an LDAP domain.
99+
.Procedure
102100

103-
The following example demonstrates creating a secret for a single LDAP domain. Replace `<namespace>` with the namespace where your {identity_service} is deployed.
104-
The filename `keystone.conf.ldap.DOMAIN_NAME` should be updated to reflect your actual domain name (e.g., `keystone.conf.ldap.myldapdomain`).
101+
. To create the `keystone-domains` secret that stores the actual LDAP configuration files that {identity_service} uses, create a local file that includes your LDAP configuration, for example, `keystone.conf.ldap.myldapdomain`:
105102

106-
First, create a local file named `keystone.DOMAIN_NAME.conf` (adjust filename as needed) with your LDAP configuration:
103+
The following example file includes the configuration for a single LDAP domain. If you have multiple LDAP domains, create a configuration file for each, for example, `keystone.DOMAIN_ONE.conf`, `keystone.DOMAIN_TWO.conf`.
104+
+
107105
[source,ini]
108106
----
109107
[ldap]

0 commit comments

Comments
 (0)