Jump To Close Expand all Collapse all Table of contents Users and Identity Management Guide Preface Making open source more inclusive 1. Introduction to the Identity Service (keystone) Expand section "1. Introduction to the Identity Service (keystone)" Collapse section "1. Introduction to the Identity Service (keystone)" 1.1. Resource credential files 1.2. OpenStack regions 2. Managing users Expand section "2. Managing users" Collapse section "2. Managing users" 2.1. Creating users with the dashboard 2.2. Editing users with the dashboard 2.3. Enabling or disabling users with the dashboard 2.4. Deleting a user with the dashboard 3. Managing roles Expand section "3. Managing roles" Collapse section "3. Managing roles" 3.1. Understanding the Red Hat OpenStack Platform admin role 3.2. Viewing roles with the CLI 3.3. Creating and assigning roles with the CLI 3.4. Creating implied roles 4. Managing groups Expand section "4. Managing groups" Collapse section "4. Managing groups" 4.1. Configuring groups with the CLI 4.2. Configuring groups with the Dashboard Expand section "4.2. Configuring groups with the Dashboard" Collapse section "4.2. Configuring groups with the Dashboard" 4.2.1. Creating a group 4.2.2. Managing Group membership 5. Quota management Expand section "5. Quota management" Collapse section "5. Quota management" 5.1. Viewing Compute quotas for a user 5.2. Updating compute quotas for a user 5.3. Setting Object Storage quotas for a user 6. Managing projects Expand section "6. Managing projects" Collapse section "6. Managing projects" 6.1. Creating a project 6.2. Editing a project 6.3. Deleting a project 6.4. Updating project quotas 6.5. Changing the active project 6.6. Project hierarchies Expand section "6.6. Project hierarchies" Collapse section "6.6. Project hierarchies" 6.6.1. Creating hierarchical projects and sub-projects 6.6.2. Configuring access to hierarchical projects 6.6.3. Reseller project overview 6.7. Project security management Expand section "6.7. Project security management" Collapse section "6.7. Project security management" 6.7.1. Creating a security group 6.7.2. Adding a security group rule 6.7.3. Deleting a security group rule 6.7.4. Deleting a security group 7. Managing domains Expand section "7. Managing domains" Collapse section "7. Managing domains" 7.1. Viewing a list of domains 7.2. Creating a new domain 7.3. Viewing the details of a domain 7.4. Disabling a domain 8. Identity management with LDAP Expand section "8. Identity management with LDAP" Collapse section "8. Identity management with LDAP" 8.1. Obtaining the CA certificate from Active Directory 8.2. Converting the CA certificate into PEM format 8.3. Configuring secure LDAP communication for the Identity service 9. Application credentials Expand section "9. Application credentials" Collapse section "9. Application credentials" 9.1. Using Application Credentials to generate tokens 9.2. Integrating Application Credentials with applications 9.3. Managing Application Credentials 9.4. Replacing Application Credentials Legal Notice Settings Close Language: English 한국어 简体中文 日本語 Language: English 한국어 简体中文 日本語 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English 한국어 简体中文 日本語 Language: English 한국어 简体中文 日本語 Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Users and Identity Management Guide Red Hat OpenStack Platform 17.0Managing users and keystone authenticationOpenStack Documentation Teamrhos-docs@redhat.comLegal NoticeAbstract Manage application credentials, users, roles, projects, and quotas. Next