The globus toolkit install is well documented in the System Administration Guide. The following local choices and modifications are applied:
OpenLDAP sorces were retreives from the Globus site and contain the required `time-out patch'. They were built using the default options. A special version (for i386-linux) that includes the ldbm backend is available. This installation can be used to evaluate a regular LDAP direcroty for other purposes.
Globus in installed in /global/ices/toolset/globus
.
It contains a `localoize.nikhef
' directory with
some per-host setups.
These files were modified:
etc/grid-info.conf
- this file is modified by
globus_setup
and contains information on the GIIS.
Modify this file in the installdir and every deploy dir to
change, e.g., the port the GIIS listens to (30001).
Our info model is MDS_SITE_INDEX
.
etc/grid-info-hosts.conf
- lists the hosts in the
microgrid. It was redistributed to all deploy directories
after Globus was deployed on all four hosts.
etc/globus-services.conf
etc/globus-services
- unchanged, it contains only a
fork-style job manager. This is a per-resource file, generated
from a system-wide file etc/globus-services.conf
.
Modify the latter file and rerun globus-local-deploy
on the relevant machine.
etc/globus-gatekeepers.conf
- the default was changed
to `daemon'. The original `inetd' requires root privilege to
install. It contains explicit entries for the four hosts,
although that might be unneccesary.
etc/grid-mapfile
- changed and distributed to
all four hosts after deployment. It contains some sample
entries for `David Groep', `Kors Bos', `Victor Klos' and
`EMIN-meet shared account'. Currently, they all map
to `davidg', the user running the gatekeeper.
etc/globus-jobmanager.conf
- this file seems modified
but is actually a default. It is updates by
SXXglobus start
to reflects a possibly changed
certificate subject of the gatekeeper (see sources).
sbin/globus-startup-lib.sh
- this file
contains the uid used by the SXX startup scripts to run
commands that do not need root priviliges.
It is set at local-deploy time to the user performing
the deployment. The statement says: GLOBUS_UID="gridadm"
.
share/certificates
- the directosy is used for a
hash-based certificate lookup from SSL. It contains
the certificates for the two new CAs (nikCA and nikhefCA),
whose hashes are `cee276c0' and `263d1de6', respectively.
share/certificates/ca-signing-policy.conf
-
This file was extended to allow: (1) the nikCA authority
to sign `/O=Vlab/O=Globus/' certificates and (2) the nikhefCA
to sign `/C=NL/O=NIKHEF/' as well as `/O=Vlab/O=Globus/'
certificates. This file has the regular EACL format used
by OpenSSL (SSLeay).
Optionally, you can distrust the Globus CA to sign Globus certificates `/O=Grid/O=Globus/' and `/C=US/O=Globus/' if needed. It seems better not to allow acces (using the grid mapfile) to any `/O=Grid/O=Globus/' credentials.
The relevant scripts are (almost) identical to the `demoCA'
shipped with SSLeay. The nikhefCA uses a local configuration
file, the nikCA still uses the global ssleay.cnf
in
the toolset/ssl directory.
A `signmail' script automated the process to signeing incoming certification requests, generated by either `globus-local-deploy' (for Grid hosts) or `grid-cert-request' (for Grid users).
globus_setup
script was called without
the -classic
option).
The MDS/GIIS setup options - MDS host is `bilbo.nikhef.nl', MDS port is 30001 and the Organization DN is `dc=nikhef, dc=nl, o=Grid'. This DN is compatible with the default Globus install (it uses the o=Grid as the base DN for the DIT).
The security (GSI) setup options - base DN for hosts is
`c=nl, o=nikhef', the base DN for users is (also)
`c=nl, o=nikhef'. If you modify these values directly in
etc/grid-security.conf
, run grid-cert-request-config
from the tools directory afterwards.
To `localize' a newly deployed globus system, and to propagate changes in
the local setup to all relevant hosts, a `localize' distribution script
Dist.sh
is available in the deploy directory localize.nikhef
.
Changes in global configuration should be propagated using this script.
Mapfiles are stored in a central location localize.nikhef/mapfiles/
.
Add and remove users there and use ./Dist.sh
to propagate.