Secure Command Line Solution for Token-based Authentication

نویسندگان

چکیده

The WLCG is modernizing its security infrastructure, replacing X.509 client authentication with the newer industry standard of JSON Web Tokens (JWTs) obtained through Open ID Connect (OIDC) protocol. There a wide variety software available using standards, but most it for browser-based applications and doesn’t adapt well to command line-based used heavily in High Throughput Computing (HTC). OIDC line did exist, not meet our requirements convenience. This paper discusses solution we have made based on popular existing secrets management from Hashicorp called vault . We package htvault-config easily configure service another htgettoken be client. In addition, integrated use tools into HTCondor workload system, although they also work independent All open source, under active development, ready use.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Fast and Secure Authentication Using Double Token based Scheme for WLANs

Authentication can provide security by preventing unauthorized usage and negotiating the credentials for secure communication. Nevertheless, it induces heavy overhead to communications, further deteriorating the quality of service (QoS). Analyzing QoS and security impact of authentication, therefore, becomes critical to developing efficient authentication schemes. In this paper, we propose a sy...

متن کامل

A secure and performant token-based authentication for infrastructure and mesh 802.1X networks

This work deals with the design of secure handoff protocols for wireless networks using the security model introduced by IEEE 802.1X standard. The key exchange model introduced in the standard might be implemented in multiple ways each one carrying advantages and disadvantages in terms of security and performance when applied to reauthentication protocol. After the analysis of different model o...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Epj Web of Conferences

سال: 2021

ISSN: ['2101-6275', '2100-014X']

DOI: https://doi.org/10.1051/epjconf/202125102036