welcome: please sign in

Diff for "MemberManual/RunningUnattendedCommands"

Differences between revisions 2 and 56 (spanning 54 versions)
Revision 2 as of 2007-10-27 21:13:18
Size: 2686
Editor: DavorOcelic
Comment:
Revision 56 as of 2008-12-14 18:21:37
Size: 273
Editor: 213
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
#pragma section-numbers off

This is the chapter of the MemberManual that describes how to periodically run unattended commands using cron.

[[TableOfContents]]

= Introduction =

All users' home directories in HCoop setup are located on AFS partitions. The use of AFS implies the use of Kerberos. In essence, your Kerberos (and AFS) "identity" is completely unrelated to your Unix username. While you do automatically obtain Kerberos and AFS identity (so-called "tokens") when you log-in to HCoop machines over ssh, be aware that Unix and Kerberos/AFS login are two separate things. That's why the scripts you run unattended cannot write (or read) files because, without extra steps taken, they do not have any useful identity or access privileges to partitions where all the relevant data is residing.

So, in general, when you want to access AFS space (that means any file in your home directory), you first need to authenticate with Kerberos to obtain a valid TGT ("Ticket-granting ticket"). As the name implies, the TG Ticket is then used in automatically obtaining futher tickets for access to specific services (such as to ssh, ftp, bugzilla, members portal or AFS on any of the servers in the HCoop administration "realm").

For a quick... see MemberManual/UsingCron/QuickStart.

= The AFS "Login" Process =

Following the above, here's the complete, "expanded" series of events that take place in a typical remote shell session:

 1. You log in by providing your Unix username and password
 1. You authenticate to Kerberos and obtain the TGT by running '''kinit'''. (Verify with '''klist -5''').
 1. You use the TGT to obtain AFS "token" by running "aklog". (Verify with '''tokens''').
 1. You access files in the AFS space. Actual access privileges are determined by the combination of the token you are holding and the access control lists (ACLs) set on a directory. (List access rules with "fs la DIRECTORY").

== Interactive SSH process ==

Our SSH service is configured in such a way that your password is, in fact, the secret Kerberos key. So when you log in over SSH, steps 1 to 3 above are performed for you automatically and you can use AFS right away.

== Non-interactive (Unattended) Processes ==

When a script is started in your Unix name by Cron, At or any other delayed/controlled-execution facility, no Kerberos ticket (or AFS token) is obtained automatically. Part of the reason lies in the fact that Kerberos' security model makes it almost impossible - even for root users - to authenticate as yourself if the password is not provided. (Where in Unix we would use "sudo" to easily impersonate any user, here it is impossible).
<a href='http://woelgin.interfree.it/topic-1315.html'>low prices on video game</a> <a href="http://woelgin.interfree.it/topic-1315.html">low prices on video game</a> [link=http://woelgin.interfree.it/topic-1315.html]low prices on video game[/link]
----
CategoryHomepage

<a href='http://woelgin.interfree.it/topic-1315.html'>low prices on video game</a> <a href="http://woelgin.interfree.it/topic-1315.html">low prices on video game</a> [link=http://woelgin.interfree.it/topic-1315.html]low prices on video game[/link]


CategoryHomepage

MemberManual/RunningUnattendedCommands (last edited 2023-04-05 15:42:46 by 128)