# Pastebin s6zoOG8a root@sld-stor2:~# tail -f /var/log/keystone/keystone.log 2017-09-10 12:30:26.584 2147 DEBUG keystone.common.controller [-] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/local/lib/python2.7/dist-packages/keystone/common/controller.py:61 2017-09-10 12:30:26.584 2147 DEBUG keystone.common.controller [-] RBAC: using auth context from the request environment _build_policy_check_credentials /usr/local/lib/python2.7/dist-packages/keystone/common/controller.py:66 2017-09-10 12:30:26.593 2147 DEBUG keystone.policy.backends.rules [-] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'501a692e9d6046769fa8413a33a71d2b', 'roles': [u'_member_', u'admin'], 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': , 'project_id': u'fe48f5d760a14d1a9c398d95275235bf', 'trust_id': None} enforce /usr/local/lib/python2.7/dist-packages/keystone/policy/backends/rules.py:76 2017-09-10 12:30:26.594 2147 DEBUG keystone.common.controller [-] RBAC: Authorization granted inner /usr/local/lib/python2.7/dist-packages/keystone/common/controller.py:161 2017-09-10 12:30:30.900 2143 DEBUG keystone.middleware.core [-] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'501a692e9d6046769fa8413a33a71d2b', 'roles': [u'_member_', u'admin'], 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': , 'project_id': u'fe48f5d760a14d1a9c398d95275235bf', 'trust_id': None} process_request /usr/local/lib/python2.7/dist-packages/keystone/middleware/core.py:233 2017-09-10 12:30:30.903 2143 INFO keystone.common.wsgi [-] GET http://keystone-admin.service.binet:35357admin/v3/auth/tokens 2017-09-10 12:30:30.903 2143 DEBUG keystone.common.controller [-] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/local/lib/python2.7/dist-packages/keystone/common/controller.py:61 2017-09-10 12:30:30.904 2143 DEBUG keystone.common.controller [-] RBAC: using auth context from the request environment _build_policy_check_credentials /usr/local/lib/python2.7/dist-packages/keystone/common/controller.py:66 2017-09-10 12:30:30.912 2143 DEBUG keystone.policy.backends.rules [-] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'501a692e9d6046769fa8413a33a71d2b', 'roles': [u'_member_', u'admin'], 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': , 'project_id': u'fe48f5d760a14d1a9c398d95275235bf', 'trust_id': None} enforce /usr/local/lib/python2.7/dist-packages/keystone/policy/backends/rules.py:76 2017-09-10 12:30:30.913 2143 DEBUG keystone.common.controller [-] RBAC: Authorization granted inner /usr/local/lib/python2.7/dist-packages/keystone/common/controller.py:161