This page contains information on GSI support in the cloud scheduler.

GSI support in the cloud scheduler allows a user to authenticate using his/her grid certificate when submitting a job to the cloud scheduler. The cloud scheduler will then use these credentials for authenticating the Nimbus workspace creation and workspace deletion.

Requirements:

  • A working CA is required to sign the dummy VM host certificate.
  • A working Globus Toolkit is required on the host running the cloud scheduler.
  • The user requires a valid grid certificate (x509)

Install NEP-52 root CA package

$ wget https://wiki.heprc.uvic.ca/twiki/pub/Restricted/CsGsiSupport/globus_simple_ca_ebd3459c_setup-0.20.tar.gz
$ gpt-build ./globus_simple_ca_ebd3459c_setup-0.20.tar.gz <flavor>
# gpt-postinstall
# $GLOBUS_LOCATION/setup/globus_simple_ca_ebd3459c_setup/setup-gsi

Request dummy host certificate for VM instances

On the cloud scheduler host:
$ mkdir VM-host-cert
$ cd VM-host-cert
$ grid-cert-request -dir . -host NEP-52_VM_instance -ca

TODO: Finish this documentation... (Andre) -- AndreCharbonneau - 2010-08-30

Topic attachments
I Attachment History Action Size Date Who CommentSorted ascending
Unknown file formatgz globus_simple_ca_ebd3459c_setup-0.20.tar.gz r1 manage 209.7 K 2010-08-30 - 20:38 UnknownUser NEP-52 CA package (root cert, signing policy, etc...)
Edit | Attach | Watch | Print version | History: r24 | r4 < r3 < r2 < r1 | Backlinks | Raw View | More topic actions...
Topic revision: r1 - 2010-08-30 - andrec
 
  • Edit
  • Attach
This site is powered by the TWiki collaboration platform Powered by PerlCopyright © 2008-2019 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback