next up previous contents
Next: Administrative environment Up: A local Globus install Previous: Temporary characteristics   Contents

Local modifications

The globus toolkit install is well documented in the System Administration Guide. The following local choices and modifications are applied:

Install paths
SSLeay in installed in /global/ices/toolset/ssl/arch/. The .../ssl/lib directory contains a configuration file that was formerly used by the nikCA but is being phased out.

OpenLDAP sorces were retreives from the Globus site and contain the required `time-out patch'. They were built using the default options. A special version (for i386-linux) that includes the ldbm backend is available. This installation can be used to evaluate a regular LDAP direcroty for other purposes.

Globus in installed in /global/ices/toolset/globus. It contains a `localoize.nikhef' directory with some per-host setups.

Modifications to the globus files

These files were modified:

etc/grid-info.conf - this file is modified by globus_setup and contains information on the GIIS. Modify this file in the installdir and every deploy dir to change, e.g., the port the GIIS listens to (30001). Our info model is MDS_SITE_INDEX.

etc/grid-info-hosts.conf - lists the hosts in the microgrid. It was redistributed to all deploy directories after Globus was deployed on all four hosts.

etc/globus-services.conf
etc/globus-services - unchanged, it contains only a fork-style job manager. This is a per-resource file, generated from a system-wide file etc/globus-services.conf. Modify the latter file and rerun globus-local-deploy on the relevant machine.

etc/globus-gatekeepers.conf - the default was changed to `daemon'. The original `inetd' requires root privilege to install. It contains explicit entries for the four hosts, although that might be unneccesary.

etc/grid-mapfile - changed and distributed to all four hosts after deployment. It contains some sample entries for `David Groep', `Kors Bos', `Victor Klos' and `EMIN-meet shared account'. Currently, they all map to `davidg', the user running the gatekeeper.

etc/globus-jobmanager.conf - this file seems modified but is actually a default. It is updates by SXXglobus start to reflects a possibly changed certificate subject of the gatekeeper (see sources).

sbin/globus-startup-lib.sh - this file contains the uid used by the SXX startup scripts to run commands that do not need root priviliges. It is set at local-deploy time to the user performing the deployment. The statement says: GLOBUS_UID="gridadm".

share/certificates - the directosy is used for a hash-based certificate lookup from SSL. It contains the certificates for the two new CAs (nikCA and nikhefCA), whose hashes are `cee276c0' and `263d1de6', respectively.

share/certificates/ca-signing-policy.conf - This file was extended to allow: (1) the nikCA authority to sign `/O=Vlab/O=Globus/' certificates and (2) the nikhefCA to sign `/C=NL/O=NIKHEF/' as well as `/O=Vlab/O=Globus/' certificates. This file has the regular EACL format used by OpenSSL (SSLeay).

Optionally, you can distrust the Globus CA to sign Globus certificates `/O=Grid/O=Globus/' and `/C=US/O=Globus/' if needed. It seems better not to allow acces (using the grid mapfile) to any `/O=Grid/O=Globus/' credentials.

the nikCA and nikhefCA authority organizations

The relevant scripts are (almost) identical to the `demoCA' shipped with SSLeay. The nikhefCA uses a local configuration file, the nikCA still uses the global ssleay.cnf in the toolset/ssl directory.

A `signmail' script automated the process to signeing incoming certification requests, generated by either `globus-local-deploy' (for Grid hosts) or `grid-cert-request' (for Grid users).

Options for globus_setup
The Globus toolkit has been set up with a a minimum number of local modifications. The setup uses the `new' GIIS model (i.e., the globus_setup script was called without the -classic option).

The MDS/GIIS setup options - MDS host is `bilbo.nikhef.nl', MDS port is 30001 and the Organization DN is `dc=nikhef, dc=nl, o=Grid'. This DN is compatible with the default Globus install (it uses the o=Grid as the base DN for the DIT).

The security (GSI) setup options - base DN for hosts is `c=nl, o=nikhef', the base DN for users is (also) `c=nl, o=nikhef'. If you modify these values directly in etc/grid-security.conf, run grid-cert-request-config from the tools directory afterwards.

To `localize' a newly deployed globus system, and to propagate changes in the local setup to all relevant hosts, a `localize' distribution script Dist.sh is available in the deploy directory localize.nikhef. Changes in global configuration should be propagated using this script. Mapfiles are stored in a central location localize.nikhef/mapfiles/. Add and remove users there and use ./Dist.sh to propagate.


next up previous contents
Next: Administrative environment Up: A local Globus install Previous: Temporary characteristics   Contents
David Groep
2001-01-25