Difference between revisions of "How To Configure gHN Security"

From Gcube Wiki
Jump to: navigation, search
Line 1: Line 1:
 
In order to enable gCube security, gHN must be properly configured. As described in the [[GCube Security Model]], invocations to gCube Running Instances are protected using authentication and authorisation functionalities, provided by the [[Virtual Organisation Management]] subsystem. The security configuration of gHN is basically needed to enable authneticated invocations among gCube Running Instances, and to verify signatures of assertions about user's roles and membership.
 
In order to enable gCube security, gHN must be properly configured. As described in the [[GCube Security Model]], invocations to gCube Running Instances are protected using authentication and authorisation functionalities, provided by the [[Virtual Organisation Management]] subsystem. The security configuration of gHN is basically needed to enable authneticated invocations among gCube Running Instances, and to verify signatures of assertions about user's roles and membership.
  
The description of administrative steps needed to enable security for gHN containers is available in the [https://wiki.gcore.research-infrastructures.eu/gCore-dev/index.php/Administrator_Guide#Configure_container_security Configure security] page of the gCore administrator's guide.
+
The description of administrative steps needed to enable security for gHN containers is available in the [https://wiki.gcore.research-infrastructures.eu/gCore-dev/index.php/Administrator_Guide#Configure_container_security Configure container security] section of the gCore administrator's guide.

Revision as of 11:37, 10 July 2009

In order to enable gCube security, gHN must be properly configured. As described in the GCube Security Model, invocations to gCube Running Instances are protected using authentication and authorisation functionalities, provided by the Virtual Organisation Management subsystem. The security configuration of gHN is basically needed to enable authneticated invocations among gCube Running Instances, and to verify signatures of assertions about user's roles and membership.

The description of administrative steps needed to enable security for gHN containers is available in the Configure container security section of the gCore administrator's guide.