-Not fully verified yet.
+Work in progress.
+
+Not verified yet.
+
+{Section: Enabling IDTOKENS}
+
+Is IDTOKENS in the authentication methods list by default?
+
+Is our best practice here to create =condor@$(TRUST_DOMAIN)= tokens? =role@$(TRUST_DOMAIN)= tokens? (There's a ticket to make the latter the default for promiscuous mode.)
+
+The key part of the configuration is the ALLOW lists, which may eventually have sane user-based defaults (if we stop shipping a config file with =use security: host_based=).
+
+Maybe what we really need is just the "upgrading from host-based to user-based security (with IDTOKENS)" page?
+
+{section: Enabling Promiscuous Mode}
+
+Enabling IDTOKENS doesn't mean you automatically start using it; you have distribute tokens first. To make that easier, you can enable "promiscuous mode" by calling =condor_token_auto_approve=. (See the man page for details.) However, that doesn't work out of the box. Add the following three lines to your configuration.
+
+{file: promiscuous-mode.config}
+# Enable IDTOKENS' promiscuous mode.
+COLLECTOR.SEC_DAEMON_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
+COLLECTOR.SEC_READ_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
+COLLECTOR.DENY_DAEMON = CONDOR_ANONYMOUS_USER*/*
+{endfile}
+
+----
{file: central-manager.config}
+CONDOR_HOST = <this machine's external IP address>
+
use security : strong
ALLOW_ADMINISTRATOR = condor@*
@@ -13,17 +40,12 @@
# Enable IDTOKENS (for daemons) and FS (for users).
SEC_DEFAULT_AUTHENTICATION_METHODS = FS, IDTOKENS
-CONDOR_HOST = <this machine's external IP address>
-
use role : CentralManager
-
-# Enable IDTOKENS' promiscuous mode.
-COLLECTOR.SEC_DAEMON_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
-COLLECTOR.SEC_READ_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
-COLLECTOR.DENY_DAEMON = CONDOR_ANONYMOUS_USER*/*
{endfile}
{file: submit.config}
+CONDOR_HOST = <central manager's external IP address>
+
use security : strong
ALLOW_ADMINISTRATOR = condor@*
@@ -36,19 +58,15 @@
# Enable IDTOKENS (for daemons) and FS (for users).
SEC_DEFAULT_AUTHENTICATION_METHODS = FS, IDTOKENS
-CONDOR_HOST = <central manager's external IP address>
-
use role : submit
# Allow any local user to submit jobs.
ALLOW_WRITE = $(ALLOW_WRITE) *@$(HOSTNAME)
-
-# Enable IDTOKENS' promiscuous mode. (Do ANONYMOUS last to keep `condor_q` working.)
-SEC_READ_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
-SEC_CLIENT_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
{endfile}
{file: execute.config}
+CONDOR_HOST = <central manager's external IP address>
+
use security : strong
ALLOW_ADMINISTRATOR = condor@*
@@ -61,11 +79,5 @@
# Enable IDTOKENS (for daemons) and FS (for users).
SEC_DEFAULT_AUTHENTICATION_METHODS = FS, IDTOKENS
-CONDOR_HOST = <central manager's external IP address>
-
use role : execute
-
-# Enable IDTOKENS' promiscuous mode. (Do ANONYMOUS last to keep `condor_q` working.)
-SEC_READ_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
-SEC_CLIENT_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
{endfile}