So does this mean that (say in a federated auth model) any malicious actor at a configured IdP can crash services calling into keystoneauth?
So does this mean that (say in a federated auth model) any malicious actor at a configured IdP can crash services calling into keystoneauth?