Difference between revisions of "RCauth Delegation Server & MasterPortal - Credential Lifetimes"

From PDP/Grid Wiki
Jump to navigationJump to search
(long lived proxy & eec)
(color coded rows)
Line 2: Line 2:
  
 
The scenario described by the [[AARC_Pilot_-_RCAuth.eu#Credential_Lifetimes | RCAuth.eu]] setup deals with certificates no multiple levels. The credential released to the Service Provider Portal (Science Gateway) is a certificate chain containing : a short lived proxy certificate, a long lived proxy certificate, and an end entity certificate. All three certificates can be created with a different lifetime, therefore lifetime configurations within this setup can be confusing. This page is dedicated to explaining every lifetime configuration you might encounter in the [[AARC_Pilot_-_RCAuth.eu | RCAuth.eu]] setup, with explanation about their location, default value and function.  
 
The scenario described by the [[AARC_Pilot_-_RCAuth.eu#Credential_Lifetimes | RCAuth.eu]] setup deals with certificates no multiple levels. The credential released to the Service Provider Portal (Science Gateway) is a certificate chain containing : a short lived proxy certificate, a long lived proxy certificate, and an end entity certificate. All three certificates can be created with a different lifetime, therefore lifetime configurations within this setup can be confusing. This page is dedicated to explaining every lifetime configuration you might encounter in the [[AARC_Pilot_-_RCAuth.eu | RCAuth.eu]] setup, with explanation about their location, default value and function.  
 +
 +
* The entries below marked with <span style="color: red;">'''red'''</span> are client side input parameters usually used in a request for a credential.
 +
* The entries below marked with <span style="color: blue;">'''blue'''</span> are server side maximums used to check for lifetime boundaries.
  
 
= Short Lived Proxy =
 
= Short Lived Proxy =
Line 8: Line 11:
  
 
{| class="wikitable"
 
{| class="wikitable"
 +
||
 
|| '''Component'''
 
|| '''Component'''
 
|| '''Sub-Component'''
 
|| '''Sub-Component'''
Line 16: Line 20:
  
 
|-
 
|-
 +
| style="background-color: red;" |
 
|| Client Portal  
 
|| Client Portal  
 
|| -
 
|| -
Line 24: Line 29:
  
 
|-
 
|-
 +
| style="background-color: red;" |
 
|| Master Portal  
 
|| Master Portal  
 
|| MP Server
 
|| MP Server
Line 32: Line 38:
  
 
|-
 
|-
 +
| style="background-color: blue;" |
 
|| Master Portal  
 
|| Master Portal  
 
|| MP Server
 
|| MP Server
Line 40: Line 47:
  
 
|-
 
|-
 +
| style="background-color: blue;" |
 
|| Master Portal  
 
|| Master Portal  
 
|| Credential Store
 
|| Credential Store
Line 54: Line 62:
  
 
{| class="wikitable"
 
{| class="wikitable"
 +
||
 
|| '''Component'''
 
|| '''Component'''
 
|| '''Sub-Component'''
 
|| '''Sub-Component'''
Line 62: Line 71:
  
 
|-
 
|-
 +
| style="background-color: red;" |
 
|| Master Portal  
 
|| Master Portal  
 
|| MP Client
 
|| MP Client
Line 76: Line 86:
  
 
{| class="wikitable"
 
{| class="wikitable"
 +
||
 
|| '''Component'''
 
|| '''Component'''
 
|| '''Sub-Component'''
 
|| '''Sub-Component'''
Line 84: Line 95:
  
 
|-
 
|-
 +
| style="background-color: red;" |
 
|| Master Portal  
 
|| Master Portal  
 
|| MP Client
 
|| MP Client
Line 92: Line 104:
  
 
|-
 
|-
 +
| style="background-color: red;" |
 
|| Delegation Server
 
|| Delegation Server
 
|| Delegation Server
 
|| Delegation Server
Line 100: Line 113:
  
 
|-
 
|-
 +
| style="background-color: blue;" |
 
|| Delegation Server
 
|| Delegation Server
 
|| Online CA
 
|| Online CA

Revision as of 14:31, 31 August 2016

Introduction

The scenario described by the RCAuth.eu setup deals with certificates no multiple levels. The credential released to the Service Provider Portal (Science Gateway) is a certificate chain containing : a short lived proxy certificate, a long lived proxy certificate, and an end entity certificate. All three certificates can be created with a different lifetime, therefore lifetime configurations within this setup can be confusing. This page is dedicated to explaining every lifetime configuration you might encounter in the RCAuth.eu setup, with explanation about their location, default value and function.

  • The entries below marked with red are client side input parameters usually used in a request for a credential.
  • The entries below marked with blue are server side maximums used to check for lifetime boundaries.

Short Lived Proxy

The lifetime of a Short Lived Proxy Certificate is determined by the following set of configurations.

Component Sub-Component Name Default Location Description
Client Portal - proxylifetime - /getproxy request Client requested lifetime value.
Master Portal MP Server defaultLifetime 12h MP Server configuration In case of missing proxylifetime from the /getproxy request, this value is used to request a short lived proxy.
Master Portal MP Server max_proxy_lifetime - tolerance 11d - 1d MP Server configuration Used within LifetimeValidator for validating the requested proxy lifetime value. These values are only used for validation and they do not SET any the effective proxy lifetime. The max_proxy_lifetime value should match the value of the lifetime configuration with the same name in the Credential Store.
Master Portal Credential Store max_proxy_lifetime 11d Credential Store configuration Server side maximum enforced by the MyProxy Store on every released proxy. This should match the value of the MP Server configuration with the same name.

Long Lived Proxy

The lifetime of a Long Lived Proxy Certificate is determined by the following configuration.

Component Sub-Component Name Default Location Description
Master Portal MP Client lifetime 11d OA4MP Client configuration This is a standard OA4MP Client configuration that is used as a requested certificate lifetime. In the context of the Master Portal this value will determine the lifetime of both long lived proxy and requested end entity certificate.

End Entity Certificate

The lifetime of a End Entity Certificate is determined by the following configuration. Note that the lifetime configuration effects both Long Lived Proxy Certificate and End Entity Certificate. This is conscious design choice because the two credentials should match up.

Component Sub-Component Name Default Location Description
Master Portal MP Client lifetime 11d OA4MP Client configuration This is a standard OA4MP Client configuration that is used as a requested certificate lifetime. In the context of the Master Portal this value will determine the lifetime of both long lived proxy and requested end entity certificate.
Delegation Server Delegation Server - 10d Hardcoded by OA4MP In case the lifetime value is missing from the /getcert request issued by the Master Portal, the lifetime of the requested certificate will default to this value.
Delegation Server Online CA MAX_LIFETIME 11d sysconfig value of the etoken-ca Server side maximum enforced by the Online CA on every released certificate.