Identity Authentication

Have Confidence in Your Authentication Service With Keystone.

What you’ll get

Based on OpenStack identity service, Keystone, our identity authentication service gives you peace of mind when it comes to the security and privacy of your data. Our reliable and user-friendly identity authentication service is ideal for authentication, policy management, and catalog services.

Simple Authentication

With Keystone, you no longer have to juggle multiple usernames and passwords, regardless of whether your applications are OpenStack based.

Learn more

Seamless Integration

Easily manage your Lightweight Directory Access Protocol (LDAP) directory and/or Single Sign On (SSO) through Keystone’s seamless, manual integration possibilities.

Learn more

Enhanced Security 

Keystone levels up your security by ensuring application credentials are stored within configuration files, instead of user credentials, reducing the risk of exposure.

Learn more

Authenticate Cloud Services and Existing Applications

Take advantage of Keystone’s vendor agnostic authentication capabilities for all your cloud services as well as your existing applications.

  • One Credential For All

    With Keystone’s advanced one-step authentication process, you can forget about logging yourself into each individual service and application.

  • Vendor Agnostic

    Regardless of its OpenStack origins, Keystone will work with any of your existing applications, ensuring that vendor related limitations are a thing of the past.

scalability

LDAP and SSO Integration

Keystone’s integration possibilities include manually connecting LDAP and SSO.

  • LDAP Compatible

    Users can manually integrate their existing LDAP directory with Keystone to fully reap the benefits of its authentication security.

  • SSO Integration

    Keystone also makes it possible for users to make the most of their SSO and further streamline the single-step authentication process through manual integration.

Enhanced Security

Minimize the risk of user credential exposure with Keystone’s application credentials.

  • Easily Authenticate Applications

    By creating application credentials, users enable their applications to authenticate to Keystone, meaning they can also delegate a portion of their role assignments.

  • Secrets Stay Secret

    As opposed to each user’s credentials being kept within the system config files, Keystone employs application credentials which only use the ID and a secret string.

Take advantage of our expertise! VEXXHOST is OpenStack Certified.

Our cloud services contain OpenStack software that has been validated through testing to provide API compatibility for OpenStack core services.

Our infrastructure is currently running Stein — the latest OpenStack release.

Get Started With

Public Cloud

Sign Up Today!
View Pricing

Interested in private cloud? Request your free quote today.

Latest Blog Posts & News

Recap of the 2019 AnsibleFest in Atlanta

AnsibleFest Atlanta 2019 wrapped up this past Thursday after two days of general sessions, breakout sessions and Open Lounge activities followed by a day of workshops. The VEXXHOST team is here to share some highlights of the event!