OpenID: Difference between revisions

From T2B Wiki
Jump to navigation Jump to search
(Created page with "Grid facilities in general and CMS in particular ar slowly moving from a certificate/proxy based authentication towards an OpenID/token based authentication[BR] This page explains how to use them yourself at T2B == Getting an OpenID identity == * Go the CMS IAM service at https://cms-auth.web.cern.ch/ and log in * At the left, you can see you active tokens. At the moment, you have none. * Go to the M machines and issue the following command: <pre> oidc-gen --iss https://...")
 
No edit summary
Line 1: Line 1:
Grid facilities in general and CMS in particular ar slowly moving from a certificate/proxy based authentication towards an OpenID/token based authentication[BR]
Grid facilities in general and CMS in particular ar slowly moving from a certificate/proxy based authentication towards an OpenID/token based authentication[BR]
This page explains how to use them yourself at T2B
This page explains how to use them yourself at T2B[BR]
IMPORTANT: these instructions only work on M19 for the time being!!!!!!
 
== Getting an OpenID identity ==
== Getting an OpenID identity ==
* Go the CMS IAM service at https://cms-auth.web.cern.ch/ and log in
* Go the CMS IAM service at https://cms-auth.web.cern.ch/ and log in
Line 9: Line 11:
</pre>
</pre>
* Follow the onscreen instructions.
* Follow the onscreen instructions.
* 'cms-id' now contains the reference to your online identity and will be used in subsequent commands. Feel free to use your own name.
* You can now go to the IAM site and see that you have just created this identity with the 'openid' scope.
* For more detailed information about the available options, you can see [https://indigo-dc.gitbook.io/oidc-agent/user/oidc-gen this page]
* Youcan make as many IDs a you wish. Each can have a different scope and thus different use cases.


For more detailed information about the option available, you can see [https://indigo-dc.gitbook.io/oidc-agent/user/oidc-gen this page]
== Register your OpenID identity at T2B ==
== Register your OpenID identity at T2B ==


Line 16: Line 21:


== Creating a token ==
== Creating a token ==
On the CMS IAM page, you will see that you have a short and long lived token. One is for direct usage, the other to easily renew without the need for a password. This is especially useful when running longer jobs.[BR]
The renewal token can also be recreated, but this does require you to give in a password.[BR]
A token is created via the following command:
<pre>
oidc-token cms-id
</pre>
Notice the use of 'cms-id' that must be the same name as the ID you created in the previous step.[BR]


== Using your token at T2B ==
== Using your token at T2B ==

Revision as of 08:13, 9 May 2023

Grid facilities in general and CMS in particular ar slowly moving from a certificate/proxy based authentication towards an OpenID/token based authentication[BR] This page explains how to use them yourself at T2B[BR] IMPORTANT: these instructions only work on M19 for the time being!!!!!!

Getting an OpenID identity

  • Go the CMS IAM service at https://cms-auth.web.cern.ch/ and log in
  • At the left, you can see you active tokens. At the moment, you have none.
  • Go to the M machines and issue the following command:
oidc-gen --iss https://cms-auth.web.cern.ch/ --scope openid -w device cms-id
  • Follow the onscreen instructions.
  • 'cms-id' now contains the reference to your online identity and will be used in subsequent commands. Feel free to use your own name.
  • You can now go to the IAM site and see that you have just created this identity with the 'openid' scope.
  • For more detailed information about the available options, you can see this page
  • Youcan make as many IDs a you wish. Each can have a different scope and thus different use cases.

Register your OpenID identity at T2B

for now, I have no idea on how to do this.You need to tell me when you connect and then I'll be able to

Creating a token

On the CMS IAM page, you will see that you have a short and long lived token. One is for direct usage, the other to easily renew without the need for a password. This is especially useful when running longer jobs.[BR] The renewal token can also be recreated, but this does require you to give in a password.[BR] A token is created via the following command:

oidc-token cms-id

Notice the use of 'cms-id' that must be the same name as the ID you created in the previous step.[BR]


Using your token at T2B

If your ID is registered at T2B and you made a new token, you can now use it easily via the usual 'gfal' commands. [BR] The gfal commands can take on both a proxy and a token depending on a environment variable. In the case of tokens, the varibal can be set in the following way:

export BEARER_TOKEN=$(oidc-token cms-id)