forked from DIRACGrid/DIRAC
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request DIRACGrid#7176 from aldbr/rel-v8r0_FEAT_DocToSetup…
…PilotWithTokens [v8.0] feat: add documentation to setup pilots with tokens
- Loading branch information
Showing
2 changed files
with
88 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -15,3 +15,4 @@ FIXME: These sections describes things | |
multiVO | ||
pitExport | ||
dedicateddfc | ||
pilotsWithTokens |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,87 @@ | ||
.. _pilots-with-tokens: | ||
|
||
===================================== | ||
Submitting pilots to CEs using tokens | ||
===================================== | ||
|
||
|
||
This guide outlines the process of setting up DIRAC to submit pilots using access tokens obtained via a ``client_credentials`` flow from a token provider. | ||
|
||
Setting up an ``IdProvider`` | ||
---------------------------- | ||
|
||
- Set up an OAuth2 client in the token provider and obtain a ``client_id`` and a ``client_secret``. | ||
|
||
.. warning:: The client credentials obtained are confidential, store them in a secure place. | ||
Any malicious user able to get access to them would be able to generate access tokens on your behalf. | ||
To avoid any major issue, we recommend you to only grant essential privileges to the client (``compute`` scopes). | ||
|
||
- Add the client credentials in the ``dirac.cfg`` of the relevant server configuration such as: | ||
|
||
.. code-block:: guess | ||
Resources | ||
{ | ||
IdProviders | ||
{ | ||
<IdProvider name> | ||
{ | ||
client_id = <client_id> | ||
client_secret = <client_secret> | ||
} | ||
} | ||
} | ||
- Then in your global configuration, add the following section to set up an ``IdProvider`` interface: | ||
|
||
.. code-block:: guess | ||
Resources | ||
{ | ||
IdProviders | ||
{ | ||
<IdProvider name> | ||
{ | ||
issuer = <OIDC provider issuer URL> | ||
} | ||
} | ||
} | ||
- Finally, connect the OIDC provider to a specific VO by adding the following option: | ||
|
||
.. code-block:: guess | ||
Registry | ||
{ | ||
VO | ||
{ | ||
<VO name> | ||
{ | ||
IdProvider = <IdProvider name> | ||
} | ||
} | ||
} | ||
.. note:: Get more details about the DIRAC configuration from the :ref:`Configuration <dirac-configuration>` section. | ||
|
||
Launching the ``TokenManagerHandler`` | ||
------------------------------------- | ||
|
||
Run the following commands from a DIRAC client to install the ``Framework/TokenManager`` Tornado service: | ||
|
||
.. code-block:: console | ||
$ dirac-proxy-init -g dirac_admin | ||
$ dirac-admin-sysadmin-cli --host <dirac host> | ||
> install service Framework TokenManager | ||
.. note:: ``Tornado`` and then ``TokenManager`` might need to be restarted. | ||
.. note:: Get more details about the system administrator interface from the :ref:`System Administrator Interface <system-admin-console>` section. | ||
|
||
Marking computing resources and VOs as token-ready | ||
-------------------------------------------------- | ||
|
||
To specify that a given VO is ready to use tokens on a given CE, add the ``Tag = Token:<VO>`` option within the CE section, and then restart the ``Site Directors``. | ||
Once all your VOs are ready to use tokens, just specify ``Tag = Token``. |