INFSO-RI-508833 Enabling Grids for E-sciencE www.eu-egee.org VOMS architecture Valerio Venturi, Vincenzo Ciaschini INFN First gLite tutorial on GILDA,

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE Practical using EGEE middleware: AA and simple job submission.
Advertisements

Introduction of Grid Security
Data Management Expert Panel - WP2. WP2 Overview.
MyProxy: A Multi-Purpose Grid Authentication Service
The VOMS Attribute Authority and its relation with Shibboleth Presenter: Vincenzo Ciaschini 8 th TF-EMC2 Meeting Firenze, March 2007.
It’s not about security... it’s about access! Grid Security Pieter van Beek.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Tutorial Getting started with GILDA.
Presentation Two: Grid Security Part Two: Grid Security A: Grid Security Infrastructure (GSI) B: PKI and X.509 certificates C: Proxy certificates D:
Military Technical Academy Bucharest, 2006 GRID SECURITY INFRASTRUCTURE (GSI) - Globus Toolkit - ADINA RIPOSAN Department of Applied Informatics.
Grid Security. Typical Grid Scenario Users Resources.
E-science grid facility for Europe and Latin America A Data Access Policy based on VOMS attributes in the Secure Storage Service Diego Scardaci.
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
An Authorization System for Grid Applications Thesis Presentation 5 th Dec 2006 Author: Wang Xiao Supervisor: Professor Heikki Hämmäinen Instructor: MSc.
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
EDINA 20 th March 2008 EDINA Geo/Grid - Security Prof. Richard O. Sinnott Technical Director, National e-Science Centre University of Glasgow, Scotland.
INFSO-RI Enabling Grids for E-sciencE Security, Authorisation and Authentication Mike Mineter Training, Outreach and Education National.
Chapter 10: Authentication Guide to Computer Network Security.
INFSO-RI Enabling Grids for E-sciencE Practicals on VOMS and MyProxy Emidio Giorgio INFN Retreat between GILDA and ESR VO, Bratislava,
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
INFSO-RI Enabling Grids for E-sciencE Sofia, 22 March 2007 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
E-science grid facility for Europe and Latin America E2GRIS1 Raúl Priego Martínez – CETA-CIEMAT (Spain)‏ Itacuruça (Brazil), 2-15 November.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
E-infrastructure shared between Europe and Latin America Security Hands-on Christian Grunfeld, UNLP 8th EELA Tutorial, La Plata, 11/12-12/12,2006.
INFSO-RI Enabling Grids for E-sciencE GILDA Practicals : Security systems GILDA Tutors Singapore, 1st South East Asia Forum -- EGEE.
E-infrastructure shared between Europe and Latin America FP6−2004−Infrastructures−6-SSA Hands-on on security Pedro Rausch IF - UFRJ.
Condor-G A Quick Introduction Alan De Smet Condor Project University of Wisconsin - Madison.
INFSO-RI Enabling Grids for E-sciencE Security in gLite Gergely Sipos MTA SZTAKI With thanks for some slides to.
EGEE-II INFSO-RI Enabling Grids for E-sciencE The GILDA training infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks VOMS Vincenzo Ciaschini EGEE/OSG Workshop.
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
VO management: Progress since Chicago Workshop Vincenzo Ciaschini 23/5/2002 CNAF – Bologna.
INFSO-RI Enabling Grids for E-sciencE Installing a gLite VOMS server Joachim Flammer Integration Team, CERN EMBRACE Tutorial, Clermont-Ferrand.
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
VOMS: Status & Plans Vincenzo Ciaschini, Valerio Venturi MWSG Meeting, CERN, Feb
Services Security A. Casajus R. Graciani. 12/12/ Overview DIRAC Security Infrastructure HSGE Transport Authentication Authorization DIRAC Authorization.
4th EELA TUTORIAL - USERS AND SYSTEM ADMINISTRATORS E-infrastructure shared between Europe and Latin America Security Hands-on Vanessa.
X.509 Proxy Certificates for Dynamic Delegation Ian Foster, Jarek Gawor, Carl Kesselman, Sam Meder, Olle Mulmo, Laura Perlman, Frank Siebenlist, Steven.
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America Practicals on Security Miguel Cárdenas Montes.
E-infrastructure shared between Europe and Latin America Security Hands-on Alexandre Duarte CERN Fifth EELA Tutorial Santiago, 06/09-07/09,2006.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
INFSO-RI Enabling Grids for E-sciencE Authorisation and Authentication in gLite Mike Mineter National e-Science Centre, Edinburgh.
INFSO-RI Enabling Grids for E-sciencE - II SLCS, VASH, and LCAS/LCMAPS Plugins All-Hands Meeting Helsinki Placi Flury, SWITCH 19.
INFSO-RI Enabling Grids for E-sciencE VOMS & MyProxy interaction Emidio Giorgio INFN NA4 Generic Applications Meeting 10 January.
Enabling Grids for E-sciencE Sofia, 17 March 2009 INFSO-RI Introduction to Grid Computing, EGEE and Bulgarian Grid Initiatives –
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSI with OpenSSL Vincenzo Ciaschini EGEE-3.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Using Certificate & Simple Job Submission Jinny Chien ASGC.
Hands-on security Carlos Fuentes RedIRIS Madrid,26 – 30 de Octubre de 2008.
Hands on Security, Authentication and Authorization Virginia Martín-Rubio Pascual RedIRIS/Red.es Curso Grid y e-Ciencia.
EGI-InSPIRE RI Grid Training for Power Users EGI-InSPIRE N G I A E G I S Grid Training for Power Users Institute of Physics Belgrade.
Grid security Enrico Fattibene INFN-CNAF 26 Settembre 20111Calcolo Parallelo su Grid e CSN4cluster.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) 马兰馨 IHEP, CAS Hands on gLite Security.
1 Grid Security Jinny Chien Academia Sinica Computing Centre Deployment team.
1 Grid Security Alessandro Paolini INFN-CNAF IV Scuola della GRID per utenti.
Enabling Grids for E-sciencE gLite security pratical tutorial Dario Russo INFN Catania Catania,
INFSO-RI Enabling Grids for E-sciencE Authorisation and Authentication Dr. Mike Mineter National e-Science Centre, Edinburgh / UK.
Authentication Services Grid security concepts and tools D. Cesini (INFN-CNAF), V.Ciaschini (INFN-CNAF), A.Paolini (INFN-CNAF) INFN Grid School, CNAF,
Overview of the New Security Model Akos Frohner (CERN) WP8 Meeting VI DataGRID Conference Barcelone, May 2003.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Authentication, Authorisation and Security Mike Mineter, National e-Science Centre.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Authentication, Authorisation and Security Emidio Giorgio INFN Catania.
INFSO-RI Enabling Grids for E-sciencE Sofia, 17 March 2009 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
Virtual Organisations and the NGS Mike Jones Research Computing Services e-Science & “The Grid” for Bio/Health Informaticians, IT January 2008.
Authentication, Authorisation and Security
Authorization and Authentication in gLite
Practicals on VOMS and MyProxy
Grid Security Jinny Chien Academia Sinica Grid Computing.
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Presentation transcript:

INFSO-RI Enabling Grids for E-sciencE VOMS architecture Valerio Venturi, Vincenzo Ciaschini INFN First gLite tutorial on GILDA, Catania,

2 Enabling Grids for E-sciencE INFSO-RI Summary AAA –GSI VOMS –Concepts –Architecture –Components

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI GSI Grid Security Infrastucture is what the Globus Toolkit use for the purpose of authentication and authorization.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI GSI – requirements (1) Single sign-on. ● The user should not be required to repeat login procedures on the grid more than once. ● Delegation. ● Once a user has successfully identified himself with the Grid, it should be possible for grid services to act on the behalf of the user as if they were the user himself. ● User-based trust relationship. ● All trust mechanism should have the user’s credential at their core. ● If a user wants to access farms A and B, there should be no need for farms A and B to trust each other. ● The user’s credential should be adequately protected. ● Private data (keys, passwords, etc…) should not circulate on the net.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI GSI – requirements (2) Integrated with local systems. The grid security mechanism should not supplant the local authorization mechanism, but instead work on top of it. ● Simple to use. The system should be simple enough on the user’s side as not to require excessive preparations before real work could begin. The system used should employ well defined standards to permit multiple implementation

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI GSI – solution (1) X.509 certificates: An ISO and IETF standard that ties public key credentials (public and private keys) to an identity. Certificates are issued by a set of well-defined Certification Authorities (CAs). Credentials are divided in two parts: The public part in the certificate, supposed to be shared. The private part, that must be kept secret by the user. PKI: –Public Key Infrastructure. –A set of IETF standards that define how the certificates and CAs must work together.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI GSI – solutions (2) GSS-API: An IETF standard that defines a unified interface to heterogeneous security mechanisms (Kerberos, X.509 certificates, etc…). Generic Security Services Application Program Interface. GSI: Globus Security Infrastructure. Ties together the other three components. Adds the capabilities of credentials delegation. Defined in a set of documents on the Globus site (

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI X.509 certificates A sample certificate venturi]$ openssl x509 –in /tmp/x509_up501 –text –noout Certificate: Data: Version: 3 (0x2) Serial Number: 1148 (0x47c) Signature Algorithm: md5WithRSAEncryption Issuer: C=IT, O=INFN, CN=INFN Certification Authority Validity Not Before: Jan 31 13:29: GMT Not After : Jan 31 13:29: GMT Subject: C=IT, O=INFN, OU=Personal Certificate, L=CNAF, CN=Vincenzo ……………. Signature Algorithm: md5WithRSAEncryption Signature: … Once you know where it is located (normally in /tmp/x509_up ) you can use openssl x509 command to read it as above. The –noout option prevent openssl from showing the real data -----BEGIN CERTIFICATE----- MIIFXzCCBEegAwIBAgICBHwwDQYJKoZIhvcNAQEEBQAwQzELMAkGA1UEBhMCSVQx DTALBgNVBAoTBElORk4xJTAjBgNVBAMTHElORk4gQ2VydGlmaWNhdGlvbiBBdXRo b3JpdHkwHhcNMDMwMTMxMTMyOTA3WhcNMDQwMTMxMTMyOTA3WjCBlzELMAkGA1UE BhMCSVQxDTALBgNVBAoTBElORk4xHTAbBgNVBAsTFFBlcnNvbmFsIENlcnRpZmlj

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI Proxy certificates Introduced by the Globus Toolkit Defined in RFC 3280 Are used for delegating of credentials based on single sign- on –A new certificate (the proxy) is created, based on the user certificate –The user certificate never travels on the net, thus remaining secure –It’s the proxy certificate that travels across the grid  The proxy certificate contains is private key, thus addressing the problem of single sign on and delegation (grid services can act on behalf of the user)  The proxy certifcate is (should be) short lived (normally 12 hours), thus reducing the damage of stolen it

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI Proxy certificates A proxy certificate is an X.509 certificate, so you can read it the same as X.509 with openssl x509 command but –The Issuer is the user instead of a CA –The subject contains “Proxy” in the CN  actually, this is true for old proxy (GT < 2.2), while RFC 3820 compliant proxy differs from the user in The DN contains a unique identificative for the user The certificate contains a critical extension (Proxy Certifcate Info extension)

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI Local authorization Based on matching of the DN on a list of accepted users (grid-mapfile). Very coarse grained authorization Remote users are mapped directly to UNIX users. Classification of users into categories must be done on a local farm basis without input from the VO (may result in the same user having very different privileges in different farms). No support for groups or roles Grid-mapfile authorization is not flexible.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI VOMS Virtual Organization Membership Service (VOMS) is a service that keeps track of the members of a VO and grants users authorization to access the resource at VO level, providing support for group membership, roles (e.g. administrator, sofware manager, student) and capabilities. Support for it is integrated in most of the grid services.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI VOMS - requirements Provide a secure system for VO to organize the user in groups and/or roles and to disseminate this information User should be able to decide which information wants to publish Compatibility with Globus Toolkit

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI VOMS - solution Each VO has its own server(s) containing groups membership, roles and capabilities informations for each member User contact the server requesting his authorization info The server send the authorization info to the client The client include it in a proxy certificate

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI FQAN short for Fully Qualified Attribute Name, is what VOMS uses to express membership and other authorization info Groups membership, roles and capabilities may be expressed in a format that bounds them together /Role=[ ][/Capability= ] venturi]$ voms-proxy-info -fqan /testVO/Role=NULL/Capability=NULL venturi]$ voms-proxy-info -fqan /testVO/Role=VO-Admin/Capability=NULL venturi]$ voms-proxy-info -fqan /testVO/Role=SoftwareManager/Capability=NULL FQAN are included in an Attribute Certificate

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI AC - Attribute Certificate Defined in RFC 3281 Attribute Certificates are used to bind a set of attributes (like membership, roles, authorization info etc) with an identity AC are digitally signed

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI VOMS and AC VOMS uses AC to include the attributes of a user in a proxy certificate The server creates and sign an AC containing the FQAN of the user (or better the FQAN requested by the user, when applicable) The client include this AC in the proxy certificate T he AC is included in a well-defined non critical extension assuring compatibility with GT-based mechanism At the resource level, the authorization info is extracted from the proxy and processed by the local site

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI VOMS - operations 1.Mutual authentication beetween client and server via GSI. 2.The client send a request to the server. 3.The server check the correctness of the request. 4.The server send back the required info (in FQAN format) included in an Attribute Certificate. 5.The client check the consistency and validity of the information returned. 6.Step 1-5 may be repeated for any number of servers. 7.The client create a proxy that includes the info returned by the server in a non critical extension. 8.The client may add user-supplied information.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI VOMS - administration What VO Managers uses to manage the authorization info for the users of a VO. Web interface and command line client are available. A user connect with a browser (having a certificate) to a page and submit a requests. VO Manager accept or refuse that request. VO Manager have the command line utilities to modify the info for a user.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI VOMS - components ● VOMS Core Services ● Server - return authorization info to the client. ● Client applications voms-proxy-init queries the server for authorization info and create a proxy certificate including it. voms-proxy-info shows the info included in a proxy. voms-proxy-destroy. ● VOMS Admin Used by VO administrator for management of membership, roles and capabilities in a VO.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI VOMS - components Authz DB is a RDBMS (currently MySQL and Oracle are supported).

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI VOMS Core Services– software status Two CVS repository –The main is at: –The gLite one is at Releases –1.3.7 in LCG – in gLite 1.1 (1.5.4 is release candidate for 1.2) –1.4.2 in VDT Version mismatches are due to projects release rules, no compatibility issues are present beetween this release (due to Oracle support, different configuration for the VOMS server are needed starting from 1.5.1).

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI VOMS Admin – software status CVS repository at Releases –0.7.6 in LCG –1.0.5 in gLite 1.1

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI voms-proxy-init - configuration voms-proxy-init get information on the server to contact by files located in $GLITE_LOCATION/etc/vomses (system-wide) or $HOME/.glite/vomses (user- specific). This location could be overwritten specifying –userconf and –confile options. In case they are directories, all the files within are scanned. A vomses file look like this: venturi]$ cat /opt/glite/etc/vomses "infngrid" "cert-voms-01.cnaf.infn.it" "15002" "/C=IT/O=INFN/OU=Host/L=CNAF/CN=cert-voms-01.cnaf.infn.it" "infngrid" "dteam" "voms.cern.ch" "15004" "/C=CH/O=CERN/OU=GRID/CN=host/voms.cern.ch" "dteam" "cms" "cert-voms-01.cnaf.infn.it" "15004" "/C=IT/O=INFN/OU=Host/L=CNAF/CN=cert-voms-01.cnaf.infn.it" "cms" "gildav" "cert-voms-01.cnaf.infn.it" "15008" "/C=IT/O=INFN/OU=Host/L=CNAF/CN=cert-voms-01.cnaf.infn.it" "gildav" "cdf" "cert-voms-01.cnaf.infn.it" "15009" "/C=IT/O=INFN/OU=Host/L=CNAF/CN=cert-voms-01.cnaf.infn.it" "cdf" While the last entry is the name of the VO, the first is the nickname to pass to the --voms option (usually coincide). Others are location of the server, port and DN of the hostcert. An optional entry could be present to specify the globus version of the server: venturi]$ cat ~/.glite/vomses "dteam-lcg" "voms.cnaf.infn.it" "15020" "/C=IT/O=INFN/OU=Host/L=CNAF/CN=voms.cnaf.infn.it" "dteam" "22" These files are normally distributed by VO managers.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI voms-proxy-init – example usage venturi]$ voms-proxy-init --voms dteam-lcg Your identity: /C=IT/O=INFN/OU=Personal Certificate/L=CNAF/CN=Valerio Enter GRID pass phrase for this identity: Creating temporary proxy Done /C=IT/O=INFN/OU=Host/L=CNAF/CN=voms.cnaf.infn.it /C=IT/O=INFN/CN=INFN Certification Authority Creating proxy Done Your proxy is valid until Thu Jun 9 21:45: Specify the VO server to contact to retrieve the attributes. Also used to specify the set of attributes to be included in the AC. --voms where command could be either a FQAN or ‘all’ meaning to retrieve all the attributes for the user. If command is absent is taken to be ‘all’. –Note that membership in groups is mandatory. Membership in all groups wll always be retrieved.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI voms-proxy-init – useful options All the options accepted by grid-proxy-init are also accepted by voms-proxy-init. Some useful extra options are: –--vomslife duration of the attribute certificate (limited by server configuration). –--order specify the order in which the attributes should be included in the AC. –--include includes a user specified file in the user's proxy that may contain additional authentication info, e.g. Kerberos ticket. –--noregen avoids generating the proxy for the connection to the server. For the complete list of options see the man page.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI voms-proxy-init – common problems venturi]$ voms-proxy-init --voms pippo VOMS Server for pippo not known! The specified vo nickname is not present in any of the configuration files. venturi]$ voms-proxy-init --voms dteam Your identity: /C=IT/O=INFN/OU=Personal Certificate/L=CNAF/CN=Valerio Enter GRID pass phrase for this identity: Creating temporary proxy Done /C=CH/O=CERN/OU=GRID/CN=host/voms.cern.ch /C=CH/O=CERN/OU=GRID/CN=CERN CA Can't interpret AC! dteam: Unable to satisfy G/dteam Request! The user is not a member of the VO. Contact the VO manager to request membership.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI voms-proxy-init – common problems venturi]$ voms-proxy-init --voms dteam-lcg Your identity: /C=IT/O=INFN/OU=Personal Certificate/L=CNAF/CN=Valerio Enter GRID pass phrase for this identity: Creating temporary proxy Done Trying for old (1.1.x) server The client cannot contact the server. The message was improved starting from version 1.3.x. The support for 1.1.x servers will be dropped in future versions so that message will disappear.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI voms-proxy-info – example usage venturi]$ voms-proxy-info -all subject : /C=IT/O=INFN/OU=Personal Certificate/L=CNAF/CN=Valerio issuer : /C=IT/O=INFN/OU=Personal Certificate/L=CNAF/CN=Valerio identity : /C=IT/O=INFN/OU=Personal Certificate/L=CNAF/CN=Valerio type : proxy strength : 512 bits path : /tmp/x509up_u501 timeleft : 11:20:05 VO : dteam subject : /C=IT/O=INFN/OU=Personal Certificate/L=CNAF/CN=Valerio issuer : /C=IT/O=INFN/OU=Host/L=CNAF/CN=voms.cnaf.infn.it attribute : /dteam/Role=NULL/Capability=NULL timeleft : 11:20:05 Shows all the info that also grid-proxy-info shows, then the information in the attribute certificate. The second timeleft is the duration of the attribute certificate.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI voms-proxy-info – common problems venturi]$ voms-proxy-info error = 5025 WARNING: Unable to verify signature! subject : /C=IT/O=INFN/OU=Personal Certificate/L=CNAF/CN=Valerio issuer : /C=IT/O=INFN/OU=Personal Certificate/L=CNAF/CN=Valerio identity : /C=IT/O=INFN/OU=Personal Certificate/L=CNAF/CN=Valerio type : proxy strength : 512 bits path : /tmp/x509up_u501 timeleft : 11:07:16 A problem occurred verifiyng the AC signature. The host certificate of the VOMS server is not present in the $X509_VOMS_DIR (default /etc/grid-security/vomsdir) directory.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI voms-proxy-destroy – usage example venturi]$ voms-proxy-destroy –Will destroy the currently existing proxy. –Also works with plain old grid-proxy-init proxies. venturi]$ voms-proxy-destroy Proxy file doesn't exist or has bad permissions. –This means that no proxy was found.

First gLite tutorial on GILDA, Catania, Enabling Grids for E-sciencE INFSO-RI References VOMS Available at Alfieri, Cecchini, Ciaschini, Spataro, dell'Agnello, Fronher, Lorentey, From gridmap-file to VOMS: managing Authorization in a Grid environment Vincenzo Ciaschini, A VOMS Attribute Certificate Profile for Authorization GSI Available at A Security Architecture for Computational Grids. I. Foster, C. Kesselman, G. Tsudik, S. Tuecke. Proc. 5th ACM Conference on Computer and Communications Security Conference, pp , A National-Scale Authentication Infrastructure. R. Butler, D. Engert, I. Foster, C. Kesselman, S. Tuecke, J. Volmer, V. Welch. IEEE Computer, 33(12):60-66, RFC S.Farrell, R.Housley, An internet Attribute Certificate Profile for Authorization, RFC 3281