Overview
Application credentials allow automation pipelines, CI/CD systems, and service accounts to authenticate without embedding user passwords. They are scoped to the user’s current project and role assignments, and can be restricted further to a specific subset of roles or API paths. Unlike user passwords, application credentials have explicit expiry dates and can be revoked independently.Prerequisites
- An active Xloud account with appropriate permissions
- Access to the Xloud Dashboard (
https://connect.<your-domain>) or CLI configured with credentials - API credentials sourced (
source admin-openrc.sh)
Create an Application Credential
- Dashboard
- CLI
Navigate to Application Credentials
Log in as the user who will own the credential. Navigate to
Identity → Application Credentials and click Create Application Credential.
Configure the credential
| Field | Description |
|---|---|
| Name | Descriptive identifier (e.g., ci-pipeline-prod) |
| Secret | Leave blank to auto-generate a cryptographically secure secret |
| Expiration Date | Set an expiry for credentials used in short-lived pipelines |
| Roles | Restrict to a subset of your role assignments (optional) |
| Access Rules | Limit the credential to specific API paths and HTTP methods |
Save the credential securely
After creation, the Dashboard displays the credential ID and secret once.
Download the
clouds.yaml snippet for immediate use.The secret is shown only once and cannot be retrieved again. Store it in a secrets
manager (such as Xloud Key Management or HashiCorp Vault) immediately after creation.
Authenticate with Application Credentials
Application credentials replace user passwords in theclouds.yaml configuration file.
Add to clouds.yaml
Add the following to your
~/.config/openstack/clouds.yaml:~/.config/openstack/clouds.yaml
Access Rules
Access rules restrict a credential to specific API operations, providing fine-grained control beyond role-level permissions.Create credential with access rules
| Field | Description |
|---|---|
path | API path pattern (supports ** wildcard) |
method | HTTP method: GET, POST, PUT, DELETE, PATCH |
service | Service type: compute, image, identity, volume, network |
Manage Existing Credentials
- Dashboard
- CLI
Navigate to Identity → Application Credentials to view all credentials owned by
the current user. Delete expired or unused credentials to reduce attack surface.
Next Steps
Users
Manage user accounts that own application credentials.
Multi-Factor Authentication
Add TOTP-based two-factor authentication to user accounts.
Identity Admin Guide
Configure token policies and security hardening for your Identity deployment.
Troubleshooting
Resolve credential rejection and authentication failure issues.