Managing OpenStack Authentication and Authorization with Keystone
Offered By: Pluralsight
Course Description
Overview
In the last few years OpenStack has gained a foothold as the de-facto standard in the area of Cloud Computing. In this course, you will learn how to manage identity and access control for an enterprise grade OpenStack deployment.
Authentication and authorization management is one of the main features of OpenStack. As an IT administrator, being sure that your organization is able to scale the number of users and to properly enforce identity and access management can be one of your hardest tasks without proper knowledge and tools. In this course, Managing OpenStack Authentication and Authorization with Keystone, you will be exposed to the complete range of OpenStack identity concepts. First, you will learn basic concepts like users, roles, and projects. Next, you will explore how to delegate the authorization privileges to your application and how to federate your OpenStack deployment with Google as the identity provider. Finally, you will discover a set of tools to manage and deploy authentication and authorization frameworks and you will learn which one fits better in a wide range of real-world scenarios. By the end of this course, you will have a theoretical and practical knowledge of OpenStack identity and access control types.
Authentication and authorization management is one of the main features of OpenStack. As an IT administrator, being sure that your organization is able to scale the number of users and to properly enforce identity and access management can be one of your hardest tasks without proper knowledge and tools. In this course, Managing OpenStack Authentication and Authorization with Keystone, you will be exposed to the complete range of OpenStack identity concepts. First, you will learn basic concepts like users, roles, and projects. Next, you will explore how to delegate the authorization privileges to your application and how to federate your OpenStack deployment with Google as the identity provider. Finally, you will discover a set of tools to manage and deploy authentication and authorization frameworks and you will learn which one fits better in a wide range of real-world scenarios. By the end of this course, you will have a theoretical and practical knowledge of OpenStack identity and access control types.
Taught by
Paolo Cruschelli
Related Courses
Access Controls(ISC)² via Coursera AWS SaaS Factory Architecture Track: SaaS Identity and Onboarding
Amazon Web Services via AWS Skill Builder Conceptos Básicos de IBM Cloud
IBM via Coursera Cybersecurity Awareness and Innovation
EIT Digital via Coursera Introduction to Microsoft Azure
Microsoft via edX