-Not fully verified yet.
+Work in progress.
+
+Not verified yet.
+
+{Section: Enabling IDTOKENS}
+
+Is IDTOKENS in the authentication methods list by default?
+
+Is our best practice here to create =condor@$(TRUST_DOMAIN)= tokens?  =role@$(TRUST_DOMAIN)= tokens?  (There's a ticket to make the latter the default for promiscuous mode.)
+
+The key part of the configuration is the ALLOW lists, which may eventually have sane user-based defaults (if we stop shipping a config file with =use security: host_based=).
+
+Maybe what we really need is just the "upgrading from host-based to user-based security (with IDTOKENS)" page?
+
+{section: Enabling Promiscuous Mode}
+
+Enabling IDTOKENS doesn't mean you automatically start using it; you have distribute tokens first.  To make that easier, you can enable "promiscuous mode" by calling =condor_token_auto_approve=.  (See the man page for details.)  However, that doesn't work out of the box.  Add the following three lines to your configuration.
+
+{file: promiscuous-mode.config}
+# Enable IDTOKENS' promiscuous mode.
+COLLECTOR.SEC_DAEMON_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
+COLLECTOR.SEC_READ_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
+COLLECTOR.DENY_DAEMON = CONDOR_ANONYMOUS_USER*/*
+{endfile}
+
+----
 
 {file: central-manager.config}
+CONDOR_HOST = <this machine's external IP address>
+
 use security : strong
 
 ALLOW_ADMINISTRATOR = condor@*
@@ -13,17 +40,12 @@
 # Enable IDTOKENS (for daemons) and FS (for users).
 SEC_DEFAULT_AUTHENTICATION_METHODS = FS, IDTOKENS
 
-CONDOR_HOST = <this machine's external IP address>
-
 use role : CentralManager
-
-# Enable IDTOKENS' promiscuous mode.
-COLLECTOR.SEC_DAEMON_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
-COLLECTOR.SEC_READ_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
-COLLECTOR.DENY_DAEMON = CONDOR_ANONYMOUS_USER*/*
 {endfile}
 
 {file: submit.config}
+CONDOR_HOST = <central manager's external IP address>
+
 use security : strong
 
 ALLOW_ADMINISTRATOR = condor@*
@@ -36,19 +58,15 @@
 # Enable IDTOKENS (for daemons) and FS (for users).
 SEC_DEFAULT_AUTHENTICATION_METHODS = FS, IDTOKENS
 
-CONDOR_HOST = <central manager's external IP address>
-
 use role : submit
 
 # Allow any local user to submit jobs.
 ALLOW_WRITE = $(ALLOW_WRITE) *@$(HOSTNAME)
-
-# Enable IDTOKENS' promiscuous mode.  (Do ANONYMOUS last to keep `condor_q` working.)
-SEC_READ_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
-SEC_CLIENT_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
 {endfile}
 
 {file: execute.config}
+CONDOR_HOST = <central manager's external IP address>
+
 use security : strong
 
 ALLOW_ADMINISTRATOR = condor@*
@@ -61,11 +79,5 @@
 # Enable IDTOKENS (for daemons) and FS (for users).
 SEC_DEFAULT_AUTHENTICATION_METHODS = FS, IDTOKENS
 
-CONDOR_HOST = <central manager's external IP address>
-
 use role : execute
-
-# Enable IDTOKENS' promiscuous mode.  (Do ANONYMOUS last to keep `condor_q` working.)
-SEC_READ_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
-SEC_CLIENT_AUTHENTICATION_METHODS = $(SEC_DEFAULT_AUTHENTICATION_METHODS) ANONYMOUS
 {endfile}