summaryrefslogtreecommitdiff
path: root/api-guide/source/users.rst
blob: 28a59201c0739cf586c58fe5c55e62dd92c450d8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
..
      Copyright 2015 OpenStack Foundation

      Licensed under the Apache License, Version 2.0 (the "License"); you may
      not use this file except in compliance with the License. You may obtain
      a copy of the License at

          http://www.apache.org/licenses/LICENSE-2.0

      Unless required by applicable law or agreed to in writing, software
      distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
      WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
      License for the specific language governing permissions and limitations
      under the License.

=====
Users
=====

The Compute API includes all end user and administrator API calls.

Role based access control
=========================

Keystone middleware is used to authenticate users and identify their roles.

The Compute API uses these roles, along with oslo.policy, to decide
what the user is authorized to do.

Refer to the to
:nova-doc:`compute admin guide </admin/architecture#projects-users-and-roles>`
for details.

Personas used in this guide
===========================

While the policy can be configured in many ways, to make it easy to understand
the most common use cases the API have been designed for, we should
standardize on the following types of user:

* application deployer: creates/deletes servers, directly or indirectly via API
* application developer: creates images and applications that run on the cloud
* cloud administrator: deploys, operates and maintains the cloud

Now in reality the picture is much more complex. Specifically, there are
likely to be different roles for observer, creator and administrator roles for
the application developer. Similarly, there are likely to be various levels of
cloud administrator permissions, such as a read-only role that is able to view
a lists of servers for a specific tenant but is not able to perform any
actions on any of them.

.. note::

  This is not attempting to be an exhaustive set of personas that consider
  various facets of the different users but instead aims to be a minimal set of
  users such that we use a consistent terminology throughout this document.

Discovering Policy
==================

An API to discover what actions you are authorized to perform is still a work
in progress. Currently this reported by a HTTP 403
:ref:`error <synchronous_faults>`.

Refer to the :nova-doc:`configuration guide </configuration/policy>` for a list
of policy rules along with their default values.