Managing OpenStack Authentication and Authorization with Keystone
Offered By: Pluralsight
Course Description
Overview
In the last few years OpenStack has gained a foothold as the de-facto standard in the area of Cloud Computing. In this course, you will learn how to manage identity and access control for an enterprise grade OpenStack deployment.
Authentication and authorization management is one of the main features of OpenStack. As an IT administrator, being sure that your organization is able to scale the number of users and to properly enforce identity and access management can be one of your hardest tasks without proper knowledge and tools. In this course, Managing OpenStack Authentication and Authorization with Keystone, you will be exposed to the complete range of OpenStack identity concepts. First, you will learn basic concepts like users, roles, and projects. Next, you will explore how to delegate the authorization privileges to your application and how to federate your OpenStack deployment with Google as the identity provider. Finally, you will discover a set of tools to manage and deploy authentication and authorization frameworks and you will learn which one fits better in a wide range of real-world scenarios. By the end of this course, you will have a theoretical and practical knowledge of OpenStack identity and access control types.
Authentication and authorization management is one of the main features of OpenStack. As an IT administrator, being sure that your organization is able to scale the number of users and to properly enforce identity and access management can be one of your hardest tasks without proper knowledge and tools. In this course, Managing OpenStack Authentication and Authorization with Keystone, you will be exposed to the complete range of OpenStack identity concepts. First, you will learn basic concepts like users, roles, and projects. Next, you will explore how to delegate the authorization privileges to your application and how to federate your OpenStack deployment with Google as the identity provider. Finally, you will discover a set of tools to manage and deploy authentication and authorization frameworks and you will learn which one fits better in a wide range of real-world scenarios. By the end of this course, you will have a theoretical and practical knowledge of OpenStack identity and access control types.
Taught by
Paolo Cruschelli
Related Courses
Software as a ServiceUniversity of California, Berkeley via Coursera Software Defined Networking
Georgia Institute of Technology via Coursera Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera Web-Technologien
openHPI Données et services numériques, dans le nuage et ailleurs
Certificat informatique et internet via France Université Numerique