A user’s roles (Fully Qualified Attribute Names) are read from
the certificate chain found within the proxy. These attributes
are signed by the user’s VOMS server when the proxy is
created. Starting with version 1.8, gPlazma supports
checking the signature of the attributes against VOMS server
certificates installed on the gPlazma node. To have
gPlazma validate the proxy attributes, place the voms
server certificates in
/etc/grid-security/vomsdir and in
/opt/d-cache/etc/dcachesrm-gplazma.policy
set
vomsValidation="true"
The default is false. The same would need
to be done on the SRM or any door node for which
gPlazma modules are called directly as a fallback.
In version 1.9, VOMS attribute validation in gPlazma
uses a method in which installation of the voms server certificate
is not required. Instead the signature on an attribute is checked
against the ca certificate that signed the voms server certificate.
To have gPlazma validate the proxy attributes in dCache 1.9,
write configuration directories and "*.lsc" files in
/etc/grid-security/vomsdir for each authorized voms
server according to
these instructions
and in /opt/d-cache/etc/dcachesrm-gplazma.policy set
vomsValidation="true"
As with previous versions, the default is false. Whether
validation is on or not, there must be a non-empty /etc/grid-security/vomsdir
on the node which is running gPlazma. It is enough to do
[root] # mkdir /etc/grid-security/vomsdir
touch /etc/grid-security/vomsdir/empty-cert.pemto create the non-empty directory.
In dCache version 1.7, SRM or the delegated
the user’s credentials to GridFTP doorgPlazma, and the user’s
attributes were extracted from the secure context. For
performance purposes, starting in version 1.8 the delegation
step is not performed. To turn on delegation, in
/opt/d-cache/config/dCacheSetup on the
node running SRM or the , set the line
GridFTP door
delegateToGPlazma=true
The default value is false. To support
delegation, host certificates must exist on the host which
runs gPlazma.