Identity Authentication

Have Confidence in Your Authentication Service With Keystone.

What you’ll get

Based on OpenStack identity service, Keystone, our identity authentication service gives you peace of mind when it comes to the security and privacy of your data. Our reliable and user-friendly identity authentication service is ideal for authentication, policy management, and catalogue services.

One-Step Authentication for all of your Cloud Services, including Existing Applications

Juggling multiple usernames and passwords is a thing of the past, whether or not your applications are OpenStack based.

Learn more

Simple Management of Cloud Users, Groups, and Roles, along with Seamless LDAP and SSO Integration

Control the security of your systems by managing individual users, groups, and roles connected to LDAP or SSO.

Learn more

Enhances Security Through Application Credentials

Users can level up their security by ensuring that application credentials are stored within configuration files, as opposed to within user credentials.

Learn more

Enables Full Auditing, including Standard and CADF

Keystone not only makes the retracing of steps possible, but takes care of any of the hassle as well. Ease security concerns with Keystone’s full auditing.

Learn more

One-Step Authentication for all of your Cloud Services, including Existing Applications

Take Advantage of Keystone’s Vendor Agnostic Authentication Capabilities for all Your Cloud Services as well as Your Existing Applications

  • One Credential For All

    With Keystone’s advanced one-step authentication process you can forget about logging yourself into each individual service and application.

  • Vendor Agnostic

    Regardless of its OpenStack origins, Keystone will work with any of your existing applications, ensuring that vendor related limitations are a thing of the past.

one step authentication

Simple Management of Cloud Users, Groups, and Roles, along with Seamless LDAP and SSO Integration

Control Cloud Users and Groups And Adjust Each of Their Roles With the Option of LDAP and SSO Integration

  • Total Control

    Add or remove users and groups from various applications and set their role to define a level of access.

  • Everything In One Place

    Integrate with an LDAP directory or SSO in order to make any updates or adjustments once, while ensuring they’re reflected throughout the entire system.

simple management

Enhances Security Through Application Credentials

Minimize the Risk of User Credential Exposure With Keystone’s Application Credentials

  • Easily Authenticate Applications

    By creating application credentials, users enable their applications to authenticate to keystone, meaning they can also delegate a portion of their role assignments.

  • Secrets Stay Secret

    As opposed to each user’s credentials being kept within the system config files, Keystone employs application credentials which only use the ID and a secret string.

application credentials

Enables Full Auditing, including Standard and CADF

Ease Security Concerns and Ensure You’re Never Left Guessing About System Events With Keystone’s Full Auditing

  • Attain Compliancy

    The auditing capabilities of Keystone make it simple to monitor and attain compliance for security, operational, and business processes

  • Never Be In The Dark

    Keystone’s full auditing enables you to know the who, what, when and where of any system activity with ease.

enables full auditing

Take advantage of our expertise! VEXXHOST is OpenStack Certified.

Our cloud services contain OpenStack software that has been validated through testing to provide API compatibility for OpenStack core services.

Our infrastructure is currently running Stein — the latest OpenStack release.

Get Started With

Private Cloud

private cloud

Latest Blog Posts & News