Experience seamless integration and robust security at the heart of the cloud. The Identity Service offers support for application credentials and allows LDAP/SAML/OpenID connect integration via Keycloak for Hosted and On-Premise editions.
Multi-tenant cloud hosted out of our global datacenters, billed per minute.
Reliable Identity Service for Secure Access
Our Identity Service provides secure authentication and access control, integrating with LDAP, SAML, and OpenID Connect for Hosted and On-Premise editions.
- Secure Authentication
Ensure secure user authentication, providing a reliable foundation for access control in your cloud environment.
- Access Control
Manage user access effectively with robust access control features, enhancing the security of your cloud resources.
- Integration Capabilities
Seamlessly integrate with LDAP, SAML, and OpenID Connect, offering versatile identity management for your Hosted and On-Premise editions.
Authenticate Cloud Services and Existing Applications
Take advantage of Keystone’s vendor-agnostic authentication capabilities for all your cloud services as well as your existing applications.
One Credential For All
With Keystone’s advanced one-step authentication process, you can forget about logging yourself into each service and application.
Regardless of its OpenStack origins, Keystone will work with any of your existing applications, ensuring that vendor-related limitations are a thing of the past.
LDAP and SSO Integration
Keystone’s integration possibilities include manually connecting LDAP and SSO.
Users can manually integrate their existing LDAP directory with Keystone to fully reap their authentication security benefits.
Keystone also makes it possible for users to make the most of their SSO and further streamline the single-step authentication process through a manual integration.
Minimize the risk of user credential exposure with Keystone’s application credentials.
Easily Authenticate Applications
By creating application credentials, users enable their applications to authenticate to Keystone, meaning they can also delegate a portion of their role assignments.
Secrets Stay Secret
As opposed to each user’s credentials kept within the system config files, Keystone employs application credentials which only use the ID and a secret string.
We ❤️ Open Source
Atmosphere stands out as a fully certified and conformant open-source platform. With both OpenStack powered certification and certified Kubernetes, it has passed all conformance tests. This guarantees a robust, high-performance, and reliable solution for your cloud needs.
Learn more about Atmosphere
Explore Atmosphere's test environment for seamless VMs, bare metal, and Kubernetes deployment. Unlock cost-saving advantages with our open-source solution.
- All Editions
- Seamlessly deploy and manage VMs, Kubernetes clusters, bare metal, and more.
- Leverage Terraform, Ansible or APIs directly powered by OpenStack & Kubernetes
- Experience cost savings with a purely open source solution across the entire stack.
- Integrated monitoring, logging, and alerting streamline day 2 operations powered by a modern Prometheus stack.
- Benefit from built-in Ceph-powered storage solution, including options like Pure Storage and more.
- Securely powered by Keycloak with LDAP support for authentication and SAML/OpenID Connect integration.
More About Public Cloud
Download White Paper
Related Blog Posts
Introduction to Cloud Load Balancers
VEXXHOST’s Load Balancers ensures optimal application and content delivery by distributing workloads across multiple computing resources and instances.
LATEST BLOG POSTS & NEWS
Explore the intricate process of Atmosphere's secure image building in this technical deep dive. Understand the role of Docker Content Trust, Trivy, and Cosign in enhancing security across the stack, ensuring the reliability and integrity of images. Discover how Atmosphere addresses unpatched security issues, verifies image signatures, and maintains continuous security through daily scans.
Atmosphere is at the forefront of cloud computing, delivering secure and reliable services to its clients. The latest evolution involves integrating Docker Content Trust and Cosign into Atmosphere's processes. This strategic move sets a new benchmark in supply chain image security.
If you're using cloud technology to store your data, it's essential to take proactive steps to protect it. Explore these 10 tips to keep your cloud infrastructure secure and have peace of mind.
Ready to move to the private cloud? Our migration guide can help you navigate the process from start to finish, so you can achieve a smooth, stress-free transition.