ATLAS HTCondor-CE ping with SCITOKEN

host: 
port: 

HTCondor basic info

Name: ce04-htc.cr.cnaf.infn.it
CE Version: 23.0.3
Version: $CondorVersion: 23.6.0 2024-02-29 BuildID: 716721 PackageID: 23.6.0-0.716721 GitSHA: 936ebe98 DAILY $
Platform: $CondorPlatform: x86_64_AlmaLinux9 $
Identity: condor@family

Test condor_ping with SCITOKEN credentials

11/24/24 01:41:01 recognized WRITE as authorization level, using command 60021.
Destination:                 schedd ce04-htc.cr.cnaf.infn.it
Remote Version:              $CondorVersion: 23.6.0 2024-02-29 BuildID: 716721 PackageID: 23.6.0-0.716721 GitSHA: 936ebe98 DAILY $
Local  Version:              $CondorVersion: 23.9.6 2024-08-08 BuildID: 748275 PackageID: 23.9.6-1 GitSHA: dfdd9eaa $
Session ID:                  ce04-htc:75982:1732408861:162048
Instruction:                 WRITE
Command:                     60021
Encryption:                  AES
Integrity:                   AES
Authenticated using:         SCITOKENS
All authentication methods:  SCITOKENS
Remote Mapping:              atlasprd004@t1htc_23
Authorized:                  TRUE

Test condor_ping with GSI credentials

This can't work with recent HTCondor-CEs that no longer support GSI

condor_ping result:
11/24/24 01:41:01 recognized WRITE as authorization level, using command 60021.
WARNING: GSI authentication is enabled by your security configuration! GSI is no longer supported.
For details, see https://htcondor.org/news/plan-to-replace-gst-in-htcss/
11/24/24 01:41:01 SECMAN: no classad from server, failing
WRITE failed!
SECMAN:2011:Connection closed during command authorization. Probably due to an unknown command.

Test condor_ping with SSL credentials

This could work only with recent HTCondor-CEs, but only with special individual SSL mapping for certificate subject:

SSL "/DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac" unix_account
condor_ping result:
11/24/24 01:41:02 recognized WRITE as authorization level, using command 60021.
11/24/24 01:41:02 SECMAN: required authentication with schedd ce04-htc.cr.cnaf.infn.it failed, so aborting command DC_SEC_QUERY.
WRITE failed!
AUTHENTICATE:1003:Failed to authenticate with any method
AUTHENTICATE:1004:Failed to authenticate using SSL

Client credentials

Token:
{
  "wlcg.ver": "1.0",
  "sub": "7dee38a3-6ab8-4fe2-9e4c-58039c21d817",
  "aud": [
    "ce04-htc.cr.cnaf.infn.it:9619",
    "condor://ce04-htc.cr.cnaf.infn.it:9619",
    "https://wlcg.cern.ch/jwt/v1/any"
  ],
  "nbf": 1732408860,
  "scope": "compute.read compute.cancel compute.modify compute.create",
  "iss": "https://atlas-auth.cern.ch/",
  "exp": 1732754460,
  "iat": 1732408860,
  "jti": "eb65076e-d074-483f-bf28-d106647a2f82",
  "client_id": "7dee38a3-6ab8-4fe2-9e4c-58039c21d817"
}

Proxy:
subject   : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac/CN=1887078256/CN=2091732609
issuer    : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac/CN=1887078256
identity  : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac
type      : RFC3820 compliant impersonation proxy
strength  : 2048
path      : /tmp/x509up_u48.prd.htcondor.11109
timeleft  : 11:59:56
key usage : Digital Signature, Key Encipherment
=== VO atlas extension information ===
VO        : atlas
subject   : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac
issuer    : /DC=ch/DC=cern/OU=computers/CN=atlas-auth.web.cern.ch
attribute : /atlas/Role=production/Capability=NULL
attribute : /atlas/Role=NULL/Capability=NULL
attribute : /atlas/alarm/Role=NULL/Capability=NULL
attribute : /atlas/cz/Role=NULL/Capability=NULL
attribute : /atlas/team/Role=NULL/Capability=NULL
attribute : testattr = testvalue (atlas)
attribute : nickname = vokac (atlas)
timeleft  : 11:59:56
uri       : voms-atlas-auth.app.cern.ch:443