[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [HTCondor-users] Lost in IDTOKENS



However, at the moment after reading the manual, I don't know how to enroll local users into this scheme.
	Although submitters can be granted IDTOKENS, in many cases, they 
don't actually need them.  If your submitters, like most, only submit jobs 
by logging into your APs, they can do so using FS instead of IDTOKENS.
continue to ssh into the schedd machines and can condor_submit/condor_q/condor_rm all they want (especially also condor_q -better-analyze which needs direct read access to a remote collector).
	We frequently allow READ-only access to our collectors to anyone 
the firewall lets through.  (It can be convenient to configure that access 
as the ANONYMOUS method.)  If you'd rather not, and you can't automate 
IDTOKENS, consider using REMOTE_FS, instead (assuming you're willing to 
mount the same shared filesystem on the APs and the CM).
Final side note (for now), how would one prohibit a user from generating a request for another user's identity? So far, I drew blanks from the manual on that.
	As far as automation, condor_token_fetch is the tool for 
automatically generating IDTOKENs, and as such gives the caller a token 
with the (HTCondor) identity they validated themselves as, e.g., by using 
FS.  If your APs have the pool signing key, and FS is turned on for your 
APs (as proposed above), then you might even just be able to run 
condor_token_fetch out of a user's dotfiles.  (Assuming that if the user's 
dotfiles are available, then so will be .condor.)
- ToddM