Related docs:
OPENSHIFT ECOSYSTEM PRIMER RHOSO OPERATOR USE CASES RHOSO TENANT USE CASES AAP INTEGRATION EPHEMERAL ACCESS CAPABILITIES DOCS MAP
This page is the RHOSO branch off the OpenShift ecosystem primer.
Use it when the question is not how to run OpenStack itself, but how IdM, enterprise identity, and AAP improve the workflows around a RHOSO deployment.
The useful split is:
That distinction matters because RHOSO has more than one identity boundary. The cloud operator domain and the tenant domain do not need to collapse into the same trust model.
RHOSO already has the pieces that make this conversation real:
eigenstate.ipa is not replacing Keystone or the OpenStack Operator.
It makes the surrounding identity, access, onboarding, DNS, certificate, and
temporary-elevation work more mechanical.
flowchart LR
ad["AD / LDAP / IdM domains"] --> idm["IdM"]
idm --> keycloak["Keycloak or upstream federation layer"]
keycloak --> keystone["Keystone / Horizon"]
aap["AAP + eigenstate.ipa"] --> idm
aap --> rhoso["RHOSO operator workflows"]
rhoso --> dp["RHEL data plane"]
keystone --> tenant["Tenant projects"]
tenant --> guest["Guest workloads and tenant services"]
The cloud operator already has tools for deploying and maintaining RHOSO. The friction usually shows up around the surrounding estate:
That is where IdM plus eigenstate.ipa adds value.
Continue to RHOSO OPERATOR USE CASES.
A hosted RHOSO deployment often has a second identity problem:
That is where the tenant-side story matters.
Continue to RHOSO TENANT USE CASES.
RHOSO already has its own operator-driven lifecycle and Ansible involvement. The useful AAP role is the work around that lifecycle:
That keeps the story honest: