[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[HTCondor-users] Lost in IDTOKENS



Hi all,

finally, we are about to move past v8.8 and with going to the 10.7 series on Debian bookworm. During this transition, I would like to get away from the current FS/HOST based security model, especially as the latter is very much frowned upon, but at the moment I'm struggling to get around IDTOKENS and how to pre-create those for users and how to distribute this centrally by a host-based configuration management tool.
My goal is to give every user access to our three local pools, enable 
flocking between them and have condor daemons talking easily between 
each other as necessary, just like they can at the moment. All relevant 
nodes have access to the same shared storage system which consists of 
dozens of different networked file systems, e.g. NFS and BeeGFS with 
Ceph to be added soon.
Currently, I don't see a problem to create a central auth token with the 
pool password and distribute this to every single central 
manager/schedd/execute node. I'm not yet sure, whether to have a 
different central auth token for every pool but even then, distributing 
one or three central secrets is not a big headache - Iâ think.
However, at the moment after reading the manual, I don't know how to 
enroll local users into this scheme.
My goal here is that users won't even notice any regression in migrating 
to a different security model, they continue to ssh into the schedd 
machines and can condor_submit/condor_q/condor_rm all they want 
(especially also condor_q -better-analyze which needs direct read access 
to a remote collector).
What I don't want is that users need to start to request tokens which we 
as admins have to manually approve of.
Sure, we could probably write a script which does all this for us, 
generate/approve a token and somehow copies this to the user's 
~/.condor/tokens.d but at the moment I don't really see how Iâ would be 
able to automate this easily[1].
Is there an easy mechanism within HTCondor itself to auto-approve 
locally generated requests (e.g. triggered by the user's ~/.profile or 
first use of a condor command?). From the man page of 
condor_token_request_auto_approve this does not seem to be the tool of 
choice.
Final side note (for now), how would one prohibit a user from generating 
a request for another user's identity? So far, I drew blanks from the 
manual on that.
As always, thanks a lot for some pointers, at the moment I'm completely 
lost between large bits of documentation and lack of documentation which 
could be applied to our set-up.
Cheers

Carsten

PS:â If relevant, I don't expect external submissions from outside our internal networking structure.
[1] Initial problems I see with trying our host based configuration 
management to tackle this includes
* central managers usually don't have knowledge of our Unix users
* schedd hosts know about the Unix users but write access to these users' home directories could prove finicky due to NFS and friends * file servers with local access to the users' files have no local condor installation *â trying to automagically create the proper tokens on the fly does add extra node inter-dependencies which Iâusually try to omit adding
* ...

--
Dr. Carsten Aulbert, Max Planck Institute for Gravitational Physics,
CallinstraÃe 38, 30167 Hannover, Germany, Phone +49 511 762 17185

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature