Identity Authentication

Have Confidence in Your Authentication Service With Keystone.

What you’ll get

Based on OpenStack identity service, Keystone, our identity authentication service gives you peace of mind when it comes to the security and privacy of your data. Our reliable and user-friendly identity authentication service is ideal for authentication, policy management, and catalog services.

Simple Authentication

With Keystone, you no longer have to juggle multiple usernames and passwords, regardless of whether your applications are OpenStack based.

Learn more

Seamless Integration

Easily manage your Lightweight Directory Access Protocol (LDAP) directory and/or Single Sign On (SSO) through Keystone’s seamless, manual integration possibilities.

Learn more

Enhanced Security 

Keystone levels up your security by ensuring application credentials are stored within configuration files, instead of user credentials, reducing the risk of exposure.

Learn more

Authenticate Cloud Services and Existing Applications

Take advantage of Keystone’s vendor-agnostic authentication capabilities for all your cloud services as well as your existing applications.

  • One Credential For All

    With Keystone’s advanced one-step authentication process, you can forget about logging yourself into each service and application.

  • Vendor Agnostic

    Regardless of its OpenStack origins, Keystone will work with any of your existing applications, ensuring that vendor-related limitations are a thing of the past.

scalability

LDAP and SSO Integration

Keystone’s integration possibilities include manually connecting LDAP and SSO.

  • LDAP Compatible

    Users can manually integrate their existing LDAP directory with Keystone to fully reap the benefits of its authentication security.

  • SSO Integration

    Keystone also makes it possible for users to make the most of their SSO and further streamline the single-step authentication process through a manual integration.

Enhanced Security

Minimize the risk of user credential exposure with Keystone’s application credentials.

  • Easily Authenticate Applications

    By creating application credentials, users enable their applications to authenticate to Keystone, meaning they can also delegate a portion of their role assignments.

  • Secrets Stay Secret

    As opposed to each user’s credentials kept within the system config files, Keystone employs application credentials which only use the ID and a secret string.

Take advantage of our expertise! VEXXHOST is OpenStack Certified.

Our cloud services contain OpenStack software that has been validated through testing to provide API compatibility for OpenStack core services.

Our infrastructure is currently running Stein — the latest OpenStack release.

Get Started With

Public Cloud

Sign Up Today!
View Pricing

Interested in private cloud? Request your free quote today.

More about Public Cloud.

Introduction to Cloud Load Balancers

VEXXHOST’s Load Balancers ensures optimal application and content delivery by distributing workloads across multiple computing resources and instances. 

LATEST BLOG POSTS & NEWS.

  • Open Infrastructure Summit Shanghai

Shanghai Open Infrastructure Summit Recap

That’s a wrap! As the passionate OpenStack users we are, the VEXXHOST team was happy to have attended the Open Infrastructure Summit in Shanghai. This open-source event was put together by the OpenStack Foundation and wrapped up this Wednesday, Nov. 6th.