Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Learning OpenStack Networking

You're reading from   Learning OpenStack Networking Build a solid foundation in virtual networking technologies for OpenStack-based clouds

Arrow left icon
Product type Paperback
Published in Aug 2018
Publisher Packt
ISBN-13 9781788392495
Length 462 pages
Edition 3rd Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
James Denton James Denton
Author Profile Icon James Denton
James Denton
Arrow right icon
View More author details
Toc

Table of Contents (16) Chapters Close

Preface 1. Introduction to OpenStack Networking FREE CHAPTER 2. Installing OpenStack 3. Installing Neutron 4. Virtual Network Infrastructure Using Linux Bridges 5. Building a Virtual Switching Infrastructure Using Open vSwitch 6. Building Networks with Neutron 7. Attaching Instances to Networks 8. Managing Security Groups 9. Role-Based Access Control 10. Creating Standalone Routers with Neutron 11. Router Redundancy Using VRRP 12. Distributed Virtual Routers 13. Load Balancing Traffic to Instances 14. Advanced Networking Topics 15. Other Books You May Enjoy

Role-Based Access Control

The Role-Based Access Control (RBAC) policy framework enables both operators and users to grant access to resources for specific projects or tenants. Prior to RBAC, Neutron applied an all-or-nothing approach to the sharing of networks across projects. If a network was marked as shared, it was shared with all projects. Access control policies built using the Neutron RBAC API allow operators and users to share certain network resources with one or more projects using a more granular approach.

As of the Pike release of OpenStack, access that can be granted using access control policies includes the following:

  • Regular port creation permissions on networks
  • Attaching router gateways to networks
  • Binding Quality of Service (QoS) policy permissions to networks or ports

In this chapter, we will focus on the concept and implementation of role-based access control...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at AU $24.99/month. Cancel anytime