Install and configure for openSUSE and SUSE Linux Enterprise¶
This section describes how to install and configure the Key Manager service for openSUSE Leap 42.2 and SUSE Linux Enterprise Server 12 SP2.
Prerequisites¶
Before you install and configure the Key Manager service, you must create a database, service credentials, and API endpoints.
- To create the database, complete these steps: - Use the database access client to connect to the database server as the - rootuser:- # mysql
- Create the - barbicandatabase:- CREATE DATABASE barbican;
- Grant proper access to the - barbicandatabase:- GRANT ALL PRIVILEGES ON barbican.* TO 'barbican'@'localhost' \ IDENTIFIED BY 'BARBICAN_DBPASS'; GRANT ALL PRIVILEGES ON barbican.* TO 'barbican'@'%' \ IDENTIFIED BY 'BARBICAN_DBPASS'; - Replace - BARBICAN_DBPASSwith a suitable password.
- Exit the database access client. - exit;
 
- Source the - admincredentials to gain access to admin-only CLI commands:- $ source admin-openrc 
- To create the service credentials, complete these steps: - Create the - barbicanuser:- $ openstack user create --domain default --password-prompt barbican 
- Add the - adminrole to the- barbicanuser:- $ openstack role add --project service --user barbican admin 
- Create the - creatorrole:- $ openstack role create creator 
- Add the - creatorrole to the- barbicanuser:- $ openstack role add --project service --user barbican creator 
- Create the barbican service entities: - $ openstack service create --name barbican --description "Key Manager" key-manager 
 
- Create the Key Manager service API endpoints: - $ openstack endpoint create --region RegionOne \ key-manager public http://controller:9311 $ openstack endpoint create --region RegionOne \ key-manager internal http://controller:9311 $ openstack endpoint create --region RegionOne \ key-manager admin http://controller:9311 
Install and configure components¶
- Install the packages: - # zypper install openstack-barbican-api openstack-barbican-keystone-listener openstack-barbican-worker 
- Edit the - /etc/barbican/barbican.conffile and complete the following actions:- In the - [DEFAULT]section, configure database access:- [DEFAULT] ... sql_connection = mysql+pymysql://barbican:BARBICAN_DBPASS@controller/barbican - Replace - BARBICAN_DBPASSwith the password you chose for the Key Manager service database.
- In the - [DEFAULT]section, configure- RabbitMQmessage queue access:- [DEFAULT] ... transport_url = rabbit://openstack:RABBIT_PASS@controller - Replace - RABBIT_PASSwith the password you chose for the- openstackaccount in- RabbitMQ.
- In the - [keystone_authtoken]section, configure Identity service access:- [keystone_authtoken] ... www_authenticate_uri = http://controller:5000 auth_url = http://controller:5000 memcached_servers = controller:11211 auth_type = password project_domain_name = default user_domain_name = default project_name = service username = barbican password = BARBICAN_PASS - Replace - BARBICAN_PASSwith the password you chose for the- barbicanuser in the Identity service.- Note - Comment out or remove any other options in the - [keystone_authtoken]section.
 
- Populate the Key Manager service database: - If you wish the Key Manager service to automatically populate the database when the service is first started, set db_auto_create to True in the - [DEFAULT]section. By default this will not be active and you can populate the database manually as below:- $ su -s /bin/sh -c "barbican-manage db upgrade" barbican - Note - Ignore any deprecation messages in this output. 
- Barbican has a plugin architecture which allows the deployer to store secrets in a number of different back-end secret stores. By default, Barbican is configured to store secrets in a basic file-based keystore. This key store is NOT safe for production use. - For a list of supported plugins and detailed instructions on how to configure them, see Configure Secret Store Back-end 
Finalize installation¶
- Copy the sample Apache vhost file into place: 
# cp /etc/apache2/conf.d/barbican-api.conf.sample /etc/apache2/vhosts.d/barbican-api.conf
- Start the Apache HTTP service and configure it to start when the system boots: - # systemctl enable apache2.service # systemctl start apache2.service 
