ATLAS HTCondor-CE ping with SCITOKEN

host: 
port: 

HTCondor basic info

Name: cet02.cern.ch
CE Version: 23.0.13
Version: $CondorVersion: 23.0.16 2024-10-09 BuildID: 760880 PackageID: 23.0.16-1 $
Platform: $CondorPlatform: x86_64_AlmaLinux9 $
Identity: condor@family

Test condor_ping with SCITOKEN credentials

11/24/24 01:35:11 recognized WRITE as authorization level, using command 60021.
Destination:                 schedd cet02.cern.ch
Remote Version:              $CondorVersion: 23.0.16 2024-10-09 BuildID: 760880 PackageID: 23.0.16-1 $
Local  Version:              $CondorVersion: 23.9.6 2024-08-08 BuildID: 748275 PackageID: 23.9.6-1 GitSHA: dfdd9eaa $
Session ID:                  cet02:261414:1732408511:3123
Instruction:                 WRITE
Command:                     60021
Encryption:                  AES
Integrity:                   AES
Authenticated using:         SCITOKENS
All authentication methods:  SCITOKENS
Remote Mapping:              atlprd55@cern.ch
Authorized:                  TRUE

Test condor_ping with GSI credentials

This can't work with recent HTCondor-CEs that no longer support GSI

condor_ping result:
11/24/24 01:35:11 recognized WRITE as authorization level, using command 60021.
WARNING: GSI authentication is enabled by your security configuration! GSI is no longer supported.
For details, see https://htcondor.org/news/plan-to-replace-gst-in-htcss/
11/24/24 01:35:11 SECMAN: no classad from server, failing
WRITE failed!
SECMAN:2011:Connection closed during command authorization. Probably due to an unknown command.

Test condor_ping with SSL credentials

This could work only with recent HTCondor-CEs, but only with special individual SSL mapping for certificate subject:

SSL "/DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac" unix_account
condor_ping result:
11/24/24 01:35:12 recognized WRITE as authorization level, using command 60021.
11/24/24 01:35:12 SECMAN: FAILED: Received "DENIED" from server for user ssl@unmapped using method SSL.
WRITE failed!
SECMAN:2010:Received "DENIED" from server for user ssl@unmapped using method SSL.

Client credentials

Token:
{
  "wlcg.ver": "1.0",
  "sub": "7dee38a3-6ab8-4fe2-9e4c-58039c21d817",
  "aud": [
    "cet02.cern.ch:9619",
    "condor://cet02.cern.ch:9619",
    "https://wlcg.cern.ch/jwt/v1/any"
  ],
  "nbf": 1732408511,
  "scope": "compute.read compute.cancel compute.modify compute.create",
  "iss": "https://atlas-auth.cern.ch/",
  "exp": 1732754111,
  "iat": 1732408511,
  "jti": "43569106-7583-416f-9c68-97b739518486",
  "client_id": "7dee38a3-6ab8-4fe2-9e4c-58039c21d817"
}

Proxy:
subject   : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac/CN=1887078256/CN=1537113289
issuer    : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac/CN=1887078256
identity  : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac
type      : RFC3820 compliant impersonation proxy
strength  : 2048
path      : /tmp/x509up_u48.prd.htcondor.908
timeleft  : 11:59:56
key usage : Digital Signature, Key Encipherment
=== VO atlas extension information ===
VO        : atlas
subject   : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac
issuer    : /DC=ch/DC=cern/OU=computers/CN=atlas-auth.web.cern.ch
attribute : /atlas/Role=production/Capability=NULL
attribute : /atlas/Role=NULL/Capability=NULL
attribute : /atlas/alarm/Role=NULL/Capability=NULL
attribute : /atlas/cz/Role=NULL/Capability=NULL
attribute : /atlas/team/Role=NULL/Capability=NULL
attribute : testattr = testvalue (atlas)
attribute : nickname = vokac (atlas)
timeleft  : 11:59:56
uri       : voms-atlas-auth.app.cern.ch:443