Mailing List Archives
	Authenticated access
	
	
     | 
    
	 
	 
     | 
    
	
	 
     | 
  
 
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [HTCondor-users] HTCondor with kerberized home directories
- Date: Tue, 12 Jun 2018 09:46:52 +0200
 
- From: Andreas Hirczy <ahi@xxxxxxxxxxxxx>
 
- Subject: Re: [HTCondor-users] HTCondor with kerberized home directories
 
Oliver Freyermuth <freyermuth@xxxxxxxxxxxxxxxxxx> writes:
> We have HTCondor installed on our desktop machines for submission, and
> the jobs run on worker nodes in a private network.  The desktops are
> naturally subject to security updates and may be rebooted about once
> per week. The home directories are mounted via NFSv4 with Kerberos 5
> authentication.
We use a similar setup with Kerberos/OpenAFS for home directories.
> How are others solving this? 
I remember there used to be solutions with forwarded and postdated
tickets. see e.g.
<https://lists.cs.wisc.edu/archive/htcondor-users/2007-October/msg00089.shtml>
A wrapper script with "k5start" might also work.
I never tried those, since it somehow compromises the security gain from
kerberos authentication. Also the setup always appeared a bit hacky and
not really robust.
<https://lists.cs.wisc.edu/archive/htcondor-users/2017-January/msg00051.shtml>
indicates some new development.
> Is the only way to have some kind of scratch space somewhere, with unix auth? 
We have quite a bit of scratch space; created by utilizing unused disc
capacity from computing nodes with MooseFS <https://moosefs.com/>.
Best regards,
Andreas
-- 
Andreas Hirczy <ahi@xxxxxxxxxxxxx>                  https://itp.tugraz.at/~ahi/
Graz University of Technology                       phone: +43/316/873-   8190
Institute of Theoretical and Computational Physics    fax: +43/316/873-10 8190
Petersgasse 16, A-8010 Graz                        mobile: +43/664/859 23 57