-
Notifications
You must be signed in to change notification settings - Fork 55
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'latest' into sync-w-latest
- Loading branch information
Showing
7 changed files
with
181 additions
and
15 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,100 @@ | ||
.. _nsf-access: | ||
|
||
NSF ACCESS | ||
---------- | ||
|
||
If your site is a part of the `National Science Foundation`_'s (NSF) | ||
`ACCESS`_ program (formerley `XSEDE`_) you can use their Identity Provider (IDP) | ||
to authenticate users for your Open OnDemand instance. | ||
|
||
OIDC Client Registration | ||
************************ | ||
|
||
You should read the `ACCESS IDP documentation`_ on how to register your Open OnDemand | ||
instance as an Open ID Connect (OIDC) client. | ||
ACCESS uses `CILogon`_ to provide a bridge from campus authentication, via the InCommon Federation, | ||
to OAuth/OIDC-based research cyberinfrastructure (CI). | ||
|
||
Once you've registered your Open OnDemand instance, you can then configure it accordingly. | ||
Since `ACCESS`_ uses Open ID Connect (OIDC) you can see our :ref:`oidc documentation <authentication-oidc>` | ||
for more details on how to configure Open OnDemand with what CILogon has provided in | ||
registering your application. | ||
|
||
Here's an example you can use to get started. Note that ``oidc_client_id`` and ``oidc_client_secret`` | ||
are commented out because they are specific to your site. | ||
|
||
.. code-block:: yaml | ||
:emphasize-lines: 3-4 | ||
oidc_uri: "/oidc" | ||
oidc_provider_metadata_url: "https://cilogon.org/.well-known/openid-configuration" | ||
# oidc_client_id: "cilogon:/client_id/..." | ||
# oidc_client_secret: "..." | ||
oidc_remote_user_claim: "sub" | ||
oidc_scope: "openid email profile org.cilogon.userinfo" | ||
oidc_session_inactivity_timeout: 28800 | ||
oidc_session_max_duration: 28800 | ||
oidc_state_max_number_of_cookies: "10 true" | ||
oidc_settings: | ||
OIDCPassIDTokenAs: "serialized" | ||
OIDCPassRefreshToken: "On" | ||
OIDCPassClaimsAs: "environment" | ||
OIDCStripCookies: "mod_auth_openidc_session mod_auth_openidc_session_chunks mod_auth_openidc_session_0 mod_auth_openidc_session_1" | ||
OIDCAuthRequestParams: "idphint=https%3A%2F%2Faccess-ci.org%2Fidp" | ||
Shibboleth and InCommon | ||
*********************** | ||
|
||
If your campus already runs Shibboleth authentication, you have an alternative to the Open ID Connect | ||
configuration above. | ||
|
||
The SAML metadata for idp.access-ci.org is published by InCommon and can be downloaded using the | ||
Metadata Query (MDQ) Service from https://mdq.incommon.org/entities/https%3A%2F%2Faccess-ci.org%2Fidp . | ||
Alternatively, you can download the metadata from https://identity.access-ci.org/access-metadata.xml | ||
and configure it in a local file. | ||
|
||
See our :ref:`shibboleth documentation <authentication-shibboleth>` for more information on | ||
Shibboleth authentication. | ||
|
||
Mapping Users | ||
************* | ||
|
||
`ACCESS`_ users have allocations on many `ACCESS`_ resource, of which you are one. | ||
This means they have disparate usernames on all these systems and a unique username | ||
on _your_ system. | ||
|
||
So you'll need an additional utility provided by access `ACCESS`_, namely the | ||
`access-oauth-mapfile`_. | ||
|
||
Follow the instructions to install that utility and you'll get a lookup table | ||
in ``/etc/grid-security/access-oauth-mapfile`` like so: | ||
|
||
.. code-block:: sh | ||
[email protected] aoakley | ||
You can set the `user_map_cmd`_ in ``ood_portal.yml`` to search this file and return | ||
the local user given the ACCESS username. | ||
|
||
.. code-block:: sh | ||
#!/bin/bash | ||
MAPPED_USER=$(grep "$1" ./delme.txt | awk '{print $2}') | ||
if [[ "$MAPPED_USER" != "" ]]; then | ||
echo -n "$MAPPED_USER" | ||
else | ||
echo "$1-not-found" | ||
fi | ||
.. _mod_auth_openidc: https://github.com/zmartzone/mod_auth_openidc | ||
.. _National Science Foundation: https://www.nsf.gov/ | ||
.. _ACCESS: https://access-ci.org/ | ||
.. _XSEDE: https://www.xsede.org/ | ||
.. _ACCESS IDP documentation: https://identity.access-ci.org/about-access-idp | ||
.. _CILogon: https://www.cilogon.org/faq | ||
.. _access-oauth-mapfile: https://github.com/access-ci-org/access-oauth-mapfile | ||
.. _user_map_cmd: ood-portal-generator-user-map-cmd |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -112,6 +112,7 @@ If I were to run and test this script - it would return values like these: | |
Jan 19 15:03:14 localhost.localdomain ood-mapping[149352]: cannot map [email protected] | ||
$ | ||
.. _gridmap_user_mapping: | ||
|
||
File User Mapping | ||
----------------- | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters