Dear Jaime, thank you very much. I was indeed hitting that bug. condor_drain -graceful slot1@removed Attempt to send DRAIN_JOBS to startd <removed> failed Failed to start DRAIN_JOBS command to slot1@removed _CONDOR_SEC_CLIENT_AUTHENTICATION=REQUIRED condor_drain -graceful removed Sent request to drain the startd <removed> with slot1@removed Best regards, Manuel > Am 29.09.2025 um 23:10 schrieb Jaime Frey via HTCondor-users <htcondor-users@xxxxxxxxxxx>: > > Your condor_drain must be able to authenticate to the collector at the ADMINISTRATOR authorization level (i.e. authenticate with an identity thatâs in the collectorâs ALLOW_ADMISITRATOR config param). If the command is run as root and your third-party host has a copy of the central managerâs POOL signing key, that is sufficient. Otherwise, you need to create an IDToken for an identity thatâs listed in ALLOW_ADMINISTRATOR and make it available to the condor_drain command. > That allows the condor_drain command to retrieve an administration security capability from the collector that can be used to issue commands to each worker node. > > However, your question caused us to discover a bug with retrieving the administration capability when using the default security configuration. You need to force authentication to occur for READ-level commands (e.g. condor_status) when itâs not required by default. You can do this by setting _CONDOR_SEC_CLIENT_AUTHENTICATION=REQUIRED as an environment variable before running the condor_drain command. > We are working on a fix for a future release to fix this bug. > > - Jaime > >> On Sep 23, 2025, at 10:38âAM, Giffels, Manuel (IAP) <manuel.giffels@xxxxxxx> wrote: >> >> Dear all, >> >> I have deployed a key on the central manager and distributed the corresponding IDTOKEN to the worker nodes for token-based authentication. >> >> I now need to drain a worker from a third-party host running a SCHEDD, which also has access to the key. >> >> Iâm unsure about the best approach in this scenario: >> â Do I need to create a second key and distribute it to the workers, using the corresponding IDTOKEN locally on the third-party host to drain? >> â Or is there a simpler/recommended way to perform this operation without creating a new key? >> >> I would appreciate any guidance or best practices for handling IDTOKENs in that scenario. >> >> Thanks a lot and best regards, >> Manuel > > _______________________________________________ > HTCondor-users mailing list > To unsubscribe, send a message to htcondor-users-request@xxxxxxxxxxx with a > subject: Unsubscribe > > The archives can be found at: https://www-auth.cs.wisc.edu/lists/htcondor-users/
Attachment:
smime.p7s
Description: S/MIME cryptographic signature