See Gnats PR 602 for a description of this documentation request, and the required Stork installation steps. -Configuring, Using Stork + Condor Credd [Carey's credd, not GreqQ's credd]: +Configuring, Using Stork + HTCondor Credd [Carey's credd, not GreqQ's credd]: Note: all references below are to the "old" condor_credd, aka the Stork credential management daemon. The fact that we now have 2 distinct credential @@ -65,7 +65,7 @@ # condor_config_val DAEMON_LIST DAEMON_LIST: COLLECTOR, CREDD, MASTER, NEGOTIATOR, SCHEDD, STARTD, STORK -Start Condor, including Stork, CredD: +Start HTCondor, including Stork, CredD: # condor_master Using Stork: See tutorial: @@ -160,9 +160,9 @@ 1) Carey did it. ;-) This code and reasoning predated Jeff. -2). Jeff can infer that the condor_credd was intended to be a Condor daemoncore +2). Jeff can infer that the condor_credd was intended to be a HTCondor daemoncore generic credential management daemon, and was intended to manage a wide variety -of credentials, including X.509 proxies, and using the daemoncore API. Condor +of credentials, including X.509 proxies, and using the daemoncore API. HTCondor daemoncore clients to the condor_credd only had to retrieve credentials from the [Stork] condor_credd, and did not have to know or care that the condor_credd used MyProxy behind the scenes to refresh X.509 credentials.