ATLAS HTCondor-CE ping with SCITOKEN

host: 
port: 

HTCondor basic info

Name: ifaece05.pic.es
CE Version: 23.0.17
Version: $CondorVersion: 23.0.17 2024-10-23 BuildID: 763724 PackageID: 23.0.17-1 $
Platform: $CondorPlatform: x86_64_AlmaLinux9 $
Identity: condor@family

Test condor_ping with SCITOKEN credentials

11/24/24 02:10:56 recognized WRITE as authorization level, using command 60021.
Destination:                 schedd ifaece05.pic.es
Remote Version:              $CondorVersion: 23.0.17 2024-10-23 BuildID: 763724 PackageID: 23.0.17-1 $
Local  Version:              $CondorVersion: 23.9.6 2024-08-08 BuildID: 748275 PackageID: 23.9.6-1 GitSHA: dfdd9eaa $
Session ID:                  ifaece05:2550895:1732410656:74180
Instruction:                 WRITE
Command:                     60021
Encryption:                  AES
Integrity:                   AES
Authenticated using:         SCITOKENS
All authentication methods:  SCITOKENS
Remote Mapping:              atprd002@pic.es
Authorized:                  TRUE

Test condor_ping with GSI credentials

This can't work with recent HTCondor-CEs that no longer support GSI

condor_ping result:
11/24/24 02:10:56 recognized WRITE as authorization level, using command 60021.
WARNING: GSI authentication is enabled by your security configuration! GSI is no longer supported.
For details, see https://htcondor.org/news/plan-to-replace-gst-in-htcss/
11/24/24 02:10:56 SECMAN: no classad from server, failing
WRITE failed!
SECMAN:2011:Connection closed during command authorization. Probably due to an unknown command.

Test condor_ping with SSL credentials

This could work only with recent HTCondor-CEs, but only with special individual SSL mapping for certificate subject:

SSL "/DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac" unix_account
condor_ping result:
11/24/24 02:10:57 recognized WRITE as authorization level, using command 60021.
11/24/24 02:10:58 SECMAN: required authentication with schedd ifaece05.pic.es failed, so aborting command DC_SEC_QUERY.
WRITE failed!
AUTHENTICATE:1003:Failed to authenticate with any method
AUTHENTICATE:1004:Failed to authenticate using SSL

Client credentials

Token:
{
  "wlcg.ver": "1.0",
  "sub": "7dee38a3-6ab8-4fe2-9e4c-58039c21d817",
  "aud": [
    "ifaece05.pic.es:9619",
    "condor://ifaece05.pic.es:9619",
    "https://wlcg.cern.ch/jwt/v1/any"
  ],
  "nbf": 1732410655,
  "scope": "compute.read compute.cancel compute.modify compute.create",
  "iss": "https://atlas-auth.cern.ch/",
  "exp": 1732756255,
  "iat": 1732410655,
  "jti": "cfec2963-1051-4763-8e43-8c24ef2b33cb",
  "client_id": "7dee38a3-6ab8-4fe2-9e4c-58039c21d817"
}

Proxy:
subject   : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac/CN=1887078256/CN=2144306108
issuer    : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac/CN=1887078256
identity  : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac
type      : RFC3820 compliant impersonation proxy
strength  : 2048
path      : /tmp/x509up_u48.prd.htcondor.10614
timeleft  : 11:59:53
key usage : Digital Signature, Key Encipherment
=== VO atlas extension information ===
VO        : atlas
subject   : /DC=ch/DC=cern/OU=Organic Units/OU=Users/CN=vokac/CN=610071/CN=Petr Vokac
issuer    : /DC=ch/DC=cern/OU=computers/CN=atlas-auth.web.cern.ch
attribute : /atlas/Role=production/Capability=NULL
attribute : /atlas/Role=NULL/Capability=NULL
attribute : /atlas/alarm/Role=NULL/Capability=NULL
attribute : /atlas/cz/Role=NULL/Capability=NULL
attribute : /atlas/team/Role=NULL/Capability=NULL
attribute : testattr = testvalue (atlas)
attribute : nickname = vokac (atlas)
timeleft  : 11:59:53
uri       : voms-atlas-auth.app.cern.ch:443