ATLAS HTCondor-CE ping with SCITOKEN

host: 
port: 

HTCondor basic info

Name: ce13.pic.es
CE Version: 5.1.6
Version: $CondorVersion: 9.0.20 Nov 15 2023 BuildID: 690225 PackageID: 9.0.20-1 $
Platform: $CondorPlatform: x86_64_CentOS7 $
Identity: condor@family

Test condor_ping with SCITOKEN credentials (new issuer)

11/27/24 20:04:15 recognized WRITE as authorization level, using command 60021.
Destination:                 schedd ce13.pic.es
Remote Version:              $CondorVersion: 9.0.20 Nov 15 2023 BuildID: 690225 PackageID: 9.0.20-1 $
Local  Version:              $CondorVersion: 23.10.18 2024-11-18 BuildID: 769621 PackageID: 23.10.18-1 GitSHA: 0208a1f0 $
Session ID:                  ce13:377637:1732734255:84126
Instruction:                 WRITE
Command:                     60021
Encryption:                  AES
Integrity:                   AES
Authenticated using:         SCITOKENS
All authentication methods:  SCITOKENS
Remote Mapping:              atprd001@pic.es
Authorized:                  TRUE

Test condor_ping with SCITOKEN credentials (old issuer)

11/27/24 20:04:16 recognized WRITE as authorization level, using command 60021.
Destination:                 schedd ce13.pic.es
Remote Version:              $CondorVersion: 9.0.20 Nov 15 2023 BuildID: 690225 PackageID: 9.0.20-1 $
Local  Version:              $CondorVersion: 23.10.18 2024-11-18 BuildID: 769621 PackageID: 23.10.18-1 GitSHA: 0208a1f0 $
Session ID:                  ce13:377637:1732734256:84127
Instruction:                 WRITE
Command:                     60021
Encryption:                  AES
Integrity:                   AES
Authenticated using:         SCITOKENS
All authentication methods:  SCITOKENS
Remote Mapping:              atprd001@pic.es
Authorized:                  TRUE


Test condor_ping with GSI credentials

This can't work with recent HTCondor-CEs that no longer support GSI

condor_ping result:
11/27/24 20:04:16 recognized WRITE as authorization level, using command 60021.
WARNING: GSI authentication is enabled by your security configuration! GSI is no longer supported.
For details, see https://htcondor.org/news/plan-to-replace-gst-in-htcss/
11/27/24 20:04:17 SECMAN: no classad from server, failing
WRITE failed!
SECMAN:2011:Connection closed during command authorization. Probably due to an unknown command.

Test condor_ping with SSL credentials

This could work only with recent HTCondor-CEs, but only with special individual SSL mapping for certificate subject:

SSL "/DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac" unix_account
condor_ping result:
11/27/24 20:04:18 recognized WRITE as authorization level, using command 60021.
11/27/24 20:04:18 SECMAN: required authentication with schedd ce13.pic.es failed, so aborting command DC_SEC_QUERY.
WRITE failed!
AUTHENTICATE:1003:Failed to authenticate with any method
AUTHENTICATE:1004:Failed to authenticate using SSL


Client credentials

Token (new issuer):
{
  "wlcg.ver": "1.0",
  "sub": "7dee38a3-6ab8-4fe2-9e4c-58039c21d817",
  "aud": [
    "ce13.pic.es:9619",
    "condor://ce13.pic.es:9619",
    "https://wlcg.cern.ch/jwt/v1/any"
  ],
  "nbf": 1732734255,
  "scope": "compute.read compute.cancel compute.modify compute.create",
  "iss": "https://atlas-auth.cern.ch/",
  "exp": 1733079855,
  "iat": 1732734255,
  "jti": "f9ae9284-072c-4207-9c8f-3a358e791b4f",
  "client_id": "7dee38a3-6ab8-4fe2-9e4c-58039c21d817"
}
Token (old issuer):
{
  "wlcg.ver": "1.0",
  "sub": "7dee38a3-6ab8-4fe2-9e4c-58039c21d817",
  "aud": [
    "ce13.pic.es:9619",
    "condor://ce13.pic.es:9619",
    "https://wlcg.cern.ch/jwt/v1/any"
  ],
  "nbf": 1732734256,
  "scope": "compute.read compute.cancel compute.modify compute.create",
  "iss": "https://atlas-auth.web.cern.ch/",
  "exp": 1733079856,
  "iat": 1732734256,
  "jti": "4cea8b29-4ad9-46b0-9df8-3a1f92cfd63c",
  "client_id": "7dee38a3-6ab8-4fe2-9e4c-58039c21d817"
}

Proxy:
subject   : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac/CN=1887078256/CN=1464468282
issuer    : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac/CN=1887078256
identity  : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac
type      : RFC3820 compliant impersonation proxy
strength  : 2048
path      : /tmp/x509up_u48.prd.htcondor.30598
timeleft  : 11:59:53
key usage : Digital Signature, Key Encipherment
=== VO atlas extension information ===
VO        : atlas
subject   : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac
issuer    : /DC=ch/DC=cern/OU=computers/CN=atlas-auth.cern.ch
attribute : /atlas/Role=production/Capability=NULL
attribute : /atlas/Role=NULL/Capability=NULL
attribute : /atlas/alarm/Role=NULL/Capability=NULL
attribute : /atlas/cz/Role=NULL/Capability=NULL
attribute : /atlas/team/Role=NULL/Capability=NULL
attribute : testattr = testvalue (atlas)
attribute : nickname = vokac (atlas)
timeleft  : 11:59:53
uri       : voms-atlas-auth.cern.ch:443