Keystone token reuse

Registered by Matthew J Black

Keystone issues new tokens for every authentication request. This can lead to excessive tokens that are sitting around that are not yet expired but are also not being used any further.

An option should be created that would allow a keystone service to provide the active token for a user when they authenticate. This would also solve scenarios where scripts, or other openstack components (see https://bugs.launchpad.net/nova/+bug/1255594), generate excessive tokens.

Blueprint information

Status:
Complete
Approver:
None
Priority:
Undefined
Drafter:
Matthew J Black
Direction:
Needs approval
Assignee:
None
Definition:
Obsolete
Series goal:
None
Implementation:
Unknown
Milestone target:
None
Completed by
Morgan Fainberg

Related branches

Sprints

Whiteboard

This has been discussed over and over again and is unlikely to occur. There are other approaches to solving the token issue(s) that are under development: Non-persistent tokens is the key one. There will also be discussion at the Kilo design summit specifically targeted at solving issues with tokens.

(?)

Work Items

This blueprint contains Public information 
Everyone can see this information.