Token binding embeds information from an external authentication mechanism, such as a Kerberos server or X.509 certificate, inside a token. By using token binding, a client can enforce the use of a specified external authentication mechanism with the token. This additional security mechanism ensures that if a token is stolen, for example, it is not usable without external authentication.
You configure the authentication types for a token binding in the
/etc/keystone/keystone.conf file:
[token]
bind = kerberos
or
[token]
bind = x509
Currently kerberos and x509 are supported.
To enforce checking of token binding, set the enforce_token_bind
option to one of these modes:
disabledDisables token bind checking.
permissiveEnables bind checking. If a token is bound to an unknown authentication mechanism, the server ignores it. The default is this mode.
strictEnables bind checking. If a token is bound to an unknown authentication mechanism, the server rejects it.
requiredEnables bind checking. Requires use of at least authentication mechanism for tokens.
kerberosEnables bind checking. Requires use of kerberos as the authentication mechanism for tokens:
[token]
enforce_token_bind = kerberos
x509Enables bind checking. Requires use of X.509 as the authentication mechanism for tokens:
[token]
enforce_token_bind = x509
Do not set enforce_token_bind = named as there is not an authentication
mechanism called named.
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.