Public bug reported:

User Ids cannot be something sepcified entirely by the Federation
providers.  If they are, there are a handful of potential problems:

1.  The userId specified will be too big for the colum (varchar 64)
2. Two different Identity Providers  can provide the same value for user_id

The solution is to use the id_mapping capability of the identity
backend.  This should be enabled on a per-idp basis, and the default
should be enabled.

The id_mapping approach needs a separate domain_id to deconflict
userids.  This domain should be created by default and linked 1-to-1
with the IdP id.

** Affects: keystone
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1505256

Title:
  Potential user_id collision between Federated IdPs

Status in Keystone:
  New

Bug description:
  User Ids cannot be something sepcified entirely by the Federation
  providers.  If they are, there are a handful of potential problems:

  1.  The userId specified will be too big for the colum (varchar 64)
  2. Two different Identity Providers  can provide the same value for user_id

  The solution is to use the id_mapping capability of the identity
  backend.  This should be enabled on a per-idp basis, and the default
  should be enabled.

  The id_mapping approach needs a separate domain_id to deconflict
  userids.  This domain should be created by default and linked 1-to-1
  with the IdP id.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1505256/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to