Skip to content

Supporting docs for the Second Token-based AuthN/Z Hackathon

Notifications You must be signed in to change notification settings

WLCG-AuthZ-WG/hackathon

Repository files navigation

Second Token-based AuthN/Z Hackathon

Topics under discussion

Pre-requisites

  • All devs registered in the WLCG VO
  • WLCG VO trusted at all services

The WLCG storage area authorization at SEs configured as follows:

  • WLCG JWT profile capability-based authorization enabled
    • AuthZ will be based on the storage.* scopes in the token, e.g. a token with the storage.modify:/ issued by the WLCG token issuer will grant write access on the whole storage area.
  • Read-only access (i.e., the ability to list directory contents and read files) to all members of the WLCG VO, i.e.:
    • all clients presenting a valid VOMS proxy for the WLCG VO
    • all clients presenting a valid JWT token issued by the WLCG token issuer
  • Write access (with the exclusion of the /protected folder) is granted to any client presenting a valid WLCG VO proxy
  • Write-access to the /protected folder (and sub-folders) is granted to the following principals:
    • all clients presenting a valid VOMS proxy with the /wlcg/Role=test role
    • all clients presenting a valid JWT token with the /wlcg/test group

To enable JWT profile compliance testing, it would help to have a storage area at each SE configured to trust the https://tf.cloud.cnaf.infn.it token issuer.

Hackathon objectives

  • Fully token-based transfers managed by RUCIO with scope and group-based authorization
  • Audience restrictions honoured at all services
  • Development of a first incarnation of TPC integration smoke test suite, based on Robot Framework
  • Local user mapping proposal

A fine-grained list of possible objectives, per component, is given here.

About

Supporting docs for the Second Token-based AuthN/Z Hackathon

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published