|
||||||||||||
|
Security ConceptsAuthentication and AuthorizationFor the Grid to be an effective framework for largely
distributed computation, users, user processes and grid services must
work in a secure environment. Due to this, all interactions between
components, especially those that are network separated, will be
mutually authenticated: depending on the specific interaction, an
entity authenticates itself to the other peer using either its own
credential or a delegated user credential or both.
Permission must be set as shown not only for security reasons,
but also because the commands to create a proxy will fail if your
private key is not protected as listed above. voms-proxy-init This command is used to contact the VOMS server and retrieve an Attribute Certificate (AC) containing user attributes that will be included in the proxy certificates. The proxy certificate will be written in /tmp/x509up_uXXX, where XXX is the Unix UID of the user, unless the environment variable X509 USER PROXY is defined, in which case its value is taken as the proxy file name. STEP 1: create your local proxy with voms extension using the following command (remember that, for this school, the passphrases of all generic certificates are equal to ISCHIA (all in capitals)):
voms-proxy-info This command is used to print to the screen the informations included in an already generated VOMS proxy. STEP 2: Verify your local proxy with the following command. If you want also check your voms extension using the option -all:
voms-proxy-destroy This command destroys an already existing VOMS local proxy. STEP 3: Destroy your local proxy and verify that it was removed with the following commands:
|
|||||||||||
|