Hi,
Then I suspect the issue is on the keystone.conf file.
As explained the installation manual:
UUID is the default provider type for the Folsom release of Keystone. However, if the remote machine
supporting your Keystone server is running the Grizzly, Havana, or Icehouse version of Keystone
(which all use the PKI provider type), edit the /etc/keystone/keystone.conf file on your
Keystone server by adding the following line to set UUID as the provider type:
provider=keystone.token.providers.uuid.Provider
Can you please check whether the setting is correct on your file.
If not present please add it to the file accordingly (as from the manual):
#
# Options defined in keystone
#
# External auth mechanisms that should add bind information to
# token e.g. kerberos, x509. (list value)
#bind=
# Enforcement policy on tokens presented to keystone with bind
# information. One of disabled, permissive, strict, required
# or a specifically required bind mode e.g. kerberos or x509
# to require binding to that authentication. (string value)
#enforce_token_bind=permissive
# Amount of time a token should remain valid (in seconds).
# (integer value)
#expiration=3600
# Controls the token construction, validation, and revocation
# operations. Core providers are
# "keystone.token.providers.[pki|uuid].Provider". (string
# value)
provider=keystone.token.providers.uuid.Provider1
# Keystone Token persistence backend driver. (string value)
#driver=keystone.token.backends.sql.Token
# Toggle for token system cacheing. This has no effect unless
# global caching
Let me know whether this solves the issue.
Regards,
Antonio
SDN Team