Your Flow — Reviewed and Corrected
Step 1: Real User Gets Domain-Scoped Token
✅ Yes. This allows you to query projects the user can access:
Step 2: You Identify the Target Project ID
✅ You now know which project the trust will apply to.
Step 3:
----------------------------------------------
You:
-
Create services and endpoints.
-
Create a
service user
(let’s saysuper-service
) with admin role in a project (service
oradmin
). -
This user can access all services — so it's a powerful identity.
-
-
Then, you:
-
Create a trust:
-
trustor_user_id =
service user
(the admin-level one) -
trustee_user_id =
real user
(e.g.,myuser
) -
impersonation=true
-
roles = admin or member
-
project_id = typically the
service
project
-
-
-
Your real user (
myuser
) uses this trust to request a token.
✅ Result:
myuser
gets a token that impersonates theservice user
, scoped to the service project, with access to all services the service user has.
Then obtain a project scoped token for my user
{
"auth": {
"identity": {
"methods": ["token"],
"token": {
"id": "<token-from-myuser>"
}
},
"scope": {
"OS-TRUST:trust": {
"id": "<trust-id>"
}
}
}
}
No comments:
Post a Comment