Difference between revisions of "How To Configure gHN Security"

From Gcube Wiki
Jump to: navigation, search
 
Line 1: Line 1:
In order to enable gCube security, gHN must be properly configured. As described in the [[GCube Security Model]], invocations to gCube Running Instances are protected using authentication and authorisation functionalities, provided by the [[Virtual Organisation Management]] subsystem. The security configuration of gHN is basically needed to enable authneticated invocations among gCube Running Instances, and to verify signatures of assertions about user's roles and membership.
+
In order to enable gCube security, gHNs must be properly configured. As described in the [[GCube Security Model]], in a secure infrastructure invocations to gCube Running Instances are authenticated and authorised. The security configuration of gHNs basically enables authentication and authorisation functionalities that are used when a request is received by a Running Instance deployed in a gHN.
  
 
The description of administrative steps needed to enable security for gHN containers is available in the [https://wiki.gcore.research-infrastructures.eu/gCore-dev/index.php/Administrator_Guide#Configure_container_security Configure container security] section of the gCore administrator's guide.
 
The description of administrative steps needed to enable security for gHN containers is available in the [https://wiki.gcore.research-infrastructures.eu/gCore-dev/index.php/Administrator_Guide#Configure_container_security Configure container security] section of the gCore administrator's guide.

Latest revision as of 11:58, 10 July 2009

In order to enable gCube security, gHNs must be properly configured. As described in the GCube Security Model, in a secure infrastructure invocations to gCube Running Instances are authenticated and authorised. The security configuration of gHNs basically enables authentication and authorisation functionalities that are used when a request is received by a Running Instance deployed in a gHN.

The description of administrative steps needed to enable security for gHN containers is available in the Configure container security section of the gCore administrator's guide.