Skip to main content

Overview

Project and user management in the Dashboard is performed under Admin → Identity (or Identity in the left sidebar). Admins can create projects (tenants), create user accounts, manage group memberships, and assign roles to control what operations each user can perform within each project.
Prerequisites
  • admin role in the target domain
  • For domain management: admin role at the cloud level

Projects

Projects (also called tenants) are the primary resource isolation boundary — instances, volumes, networks, and quotas are all scoped to a project.

Create a Project

Open Project list

Navigate to Admin → Identity → Projects (or Identity → Projects). Click Create Project.

Fill in project details

FieldDescription
NameUnique project name (e.g., dev-team, production)
DescriptionOptional description
EnabledToggle on to activate immediately
DomainParent domain (usually Default)

Project Members tab

Add users and groups to the project and assign roles during creation. You can also do this later.

Project Groups tab

Add groups of users with a role assignment.

Quotas tab

Set resource quotas for the project. Leave blank to inherit defaults. See Quotas for details.

Modify a Project

In the project row, open Actions:
ActionDescription
Edit ProjectChange name, description, enabled state
Modify UsersAdd/remove users and their roles
Modify GroupsAdd/remove groups and their roles
Modify QuotasAdjust resource limits
Delete ProjectPermanently deletes the project and all its resources
Deleting a project is irreversible. All instances, volumes, networks, and other resources in the project are permanently deleted. Verify that the project is fully decommissioned before deletion.

Users

Create a User

Open User Management

Navigate to Admin → Identity → Users and click Create User.

Fill in user details

FieldDescription
DomainIdentity domain for this user (usually Default)
User NameLogin username
DescriptionOptional
EmailUser email address
PasswordInitial password — user should change on first login
Primary ProjectDefault project context after login
RoleInitial role assignment in the primary project
EnabledToggle on to allow login

Manage User Roles

Role assignments connect a user to a project with a specific permission level.
In the user row, open Actions → Edit User and navigate to the Role Assignments section.You can also add/remove project assignments from here.

Standard Roles

RoleCapabilities
adminFull administrative access to all resources and operations
memberStandard user — can create and manage resources within a project
readerRead-only access — can view resources but not create or modify
For custom roles with fine-grained permissions, see Policy Management.

Groups

Groups simplify bulk role management. Assign a group to a project with a role — all group members inherit that role assignment.

Create a Group

Open Group management

Navigate to Admin → Identity → Groups and click Create Group. Enter a name and description.

Add members

In the group row, open Actions → Manage Members. Add users from the available list to the group.

Assign to a project

In the project row, open Actions → Modify Groups. Add the group and select the role.

Domains

Domains provide a top-level isolation boundary for multi-organization or multi-tenant deployments. Each domain has its own users, groups, and projects.
Domain management requires cloud-level admin access, not just project-level admin.
Navigate to Admin → Identity → Domains to create and manage domains.
FieldDescription
NameDomain identifier (e.g., customer-a, engineering)
DescriptionOptional
EnabledDisable to prevent all logins in the domain
To create a domain admin (a user who can manage users/projects within their domain but not the entire cloud), assign the admin role to the user scoped to the domain (not project-scoped).

Next Steps

Identity User Guide

User account operations, password management, and profiles

Roles & Permissions

Role definitions, implied roles, and custom role creation

Quotas

Set per-project resource limits

Policy Management

Define fine-grained permissions with oslo.policy rules