<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://docs.snic.se/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Michaela+Barth+%28PDC%29</id>
	<title>SNIC Documentation - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="http://docs.snic.se/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Michaela+Barth+%28PDC%29"/>
	<link rel="alternate" type="text/html" href="http://docs.snic.se/wiki/Special:Contributions/Michaela_Barth_(PDC)"/>
	<updated>2026-04-29T23:54:05Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.10</generator>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=PRACE_Sweden_F2F_160524&amp;diff=6276</id>
		<title>PRACE Sweden F2F 160524</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=PRACE_Sweden_F2F_160524&amp;diff=6276"/>
		<updated>2016-05-09T11:44:09Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;PRACE Sweden F2F meeting on May 24th at PDC&lt;br /&gt;
&lt;br /&gt;
Timing: 9:30 - 15:30 to allow for travelling. &lt;br /&gt;
&lt;br /&gt;
Location: Room 304 (3rd floor), Teknikringen 14, Stockholm, KTH &lt;br /&gt;
If you are there much earlier, wait in the PDC kitchen on the 4th floor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Agenda=&lt;br /&gt;
&lt;br /&gt;
* (Coffee, Tea and some fruits serves from 9:00)&lt;br /&gt;
* 9.30 Welcome ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 9:40 Information on (past and upcoming) PRACE calls and DECI ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:00 PRACE Social Media Statistics and Promotion of useful services in PRACE ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:20 SHAPE overview ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:35 SHAPE progress ([[User:Jing_Gong_(PDC)|Jing]])&lt;br /&gt;
* 10:50 PRACE EUDAT connections (MoU, HiResClimate) ([[User:Dejan_Vitlacil_(PDC)|Dejan]])&lt;br /&gt;
* 11:15 Status PRACE operations ([[User:Cristian_Cira_(PDC)|Cristian]])&lt;br /&gt;
&lt;br /&gt;
Lunchbuffé at Hyllan, Restaurang Q, Osquldas väg 4 (&amp;quot;I lunchbuffén ingår varmrätt, soppa, grönsaker, smör &amp;amp; bröd samt 1 mineralvatten eller 1 lättöl, kaffe/té och liten sötsak&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* 12:55 Grouppicture&lt;br /&gt;
* 13:00 BioExcel CoE ([[User:Rossen_Apostolov_(PDC)|Rossen]])&lt;br /&gt;
* 13:30 Planningstatus for the Spring School 2017 ([[User:Rossen_Apostolov_(PDC)|Rossen]] &amp;amp; [[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 13:40 SNIC update and news (Jacko Koster)&lt;br /&gt;
* 14:00 PRACE-5IP outlook ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 14:15 WP5 in a nutshell ([[User:Gert_Svensson(PDC)|Gert]], [[User:Andreas_Johansson_NSC)|Andreas]])&lt;br /&gt;
* 14:30 WP7 exchange session: [[User:Chandan_Basu_(NSC)|Chandan]], [[User:Mikael_R%C3%A4nnar_(HPC2N)|Mikael]], [[User:Michael_Schliephake_(PDC)|Michael]] (10mins each)&lt;br /&gt;
* 15:00 Open discussion&lt;br /&gt;
* 15:30 End&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
-&amp;gt; 11 people (http://doodle.com/poll/bc8x7ftvgpggyqrw)&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=PRACE_Sweden_F2F_160524&amp;diff=6248</id>
		<title>PRACE Sweden F2F 160524</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=PRACE_Sweden_F2F_160524&amp;diff=6248"/>
		<updated>2016-04-22T09:01:32Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;PRACE Sweden F2F meeting on May 24th at PDC&lt;br /&gt;
&lt;br /&gt;
Timing: 9:30 - 15:30 to allow for travelling. &lt;br /&gt;
&lt;br /&gt;
Location: Room 304 (3rd floor), Teknikringen 14, Stockholm, KTH &lt;br /&gt;
If you are there much earlier, wait in the PDC kitchen on the 4th floor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Agenda=&lt;br /&gt;
&lt;br /&gt;
* (Coffee, Tea and some fruits serves from 9:00)&lt;br /&gt;
* 9.30 Welcome ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 9:40 Information on (past and upcoming) PRACE calls and DECI ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:00 PRACE Social Media Statistics and Promotion of useful services in PRACE ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:20 SHAPE overview ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:35 SHAPE progress ([[User:Jing_Gong_(PDC)|Jing]])&lt;br /&gt;
* 10:50 PRACE EUDAT connections (MoU, HiResClimate) ([[User:Dejan_Vitlacil_(PDC)|Dejan]])&lt;br /&gt;
* 11:15 Status PRACE operations ([[User:Cristian_Cira_(PDC)|Cristian]])&lt;br /&gt;
&lt;br /&gt;
Lunchbuffé at Hyllan, Restaurang Q, Osquldas väg 4 (&amp;quot;I lunchbuffén ingår varmrätt, soppa, grönsaker, smör &amp;amp; bröd samt 1 mineralvatten eller 1 lättöl, kaffe/té och liten sötsak&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* 13:00 BioExcel CoE ([[User:Rossen_Apostolov_(PDC)|Rossen]])&lt;br /&gt;
* 13:30 Planningstatus for the Spring School 2017 ([[User:Rossen_Apostolov_(PDC)|Rossen]] &amp;amp; [[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 13:40 SNIC update and news (Jacko Koster)&lt;br /&gt;
* 14:00 PRACE-5IP outlook ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 14:15 WP5 in a nutshell ([[User:Gert_Svensson(PDC)|Gert]], [[User:Andreas_Johansson_NSC)|Andreas]])&lt;br /&gt;
* 14:30 WP7 exchange session: [[User:Chandan_Basu_(NSC)|Chandan]], [[User:Mikael_R%C3%A4nnar_(HPC2N)|Mikael]], [[User:Michael_Schliephake_(PDC)|Michael]] (10mins each)&lt;br /&gt;
* 15:00 Open discussion&lt;br /&gt;
* 15:30 End&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
-&amp;gt; 11 people (http://doodle.com/poll/bc8x7ftvgpggyqrw)&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=PRACE_Sweden_F2F_160524&amp;diff=6246</id>
		<title>PRACE Sweden F2F 160524</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=PRACE_Sweden_F2F_160524&amp;diff=6246"/>
		<updated>2016-04-22T05:55:08Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;PRACE Sweden F2F meeting on May 24th at PDC&lt;br /&gt;
&lt;br /&gt;
Timing: 9:30 - 15:30 to allow for travelling. &lt;br /&gt;
&lt;br /&gt;
Location: Room 304 (3rd floor), Teknikringen 14, Stockholm, KTH &lt;br /&gt;
If you are there much earlier, wait in the PDC kitchen on the 4th floor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Agenda=&lt;br /&gt;
&lt;br /&gt;
* 9.30 Welcome ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 9:40 Information on (past and upcoming) PRACE calls and DECI ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:00 PRACE Social Media Statistics and Promotion of useful services in PRACE ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:20 SHAPE overview ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:35 SHAPE progress ([[User:Jing_Gong_(PDC)|Jing]])&lt;br /&gt;
* 10:50 PRACE EUDAT connections (MoU, HiResClimate) ([[User:Dejan_Vitlacil_(PDC)|Dejan]])&lt;br /&gt;
* 11:15 Status PRACE operations ([[User:Cristian_Cira_(PDC)|Cristian]])&lt;br /&gt;
&lt;br /&gt;
Lunch Break&lt;br /&gt;
&lt;br /&gt;
* 13:00 BioExcel CoE ([[User:Rossen_Apostolov_(PDC)|Rossen]])&lt;br /&gt;
* 13:30 Planningstatus for the Spring School 2017 ([[User:Rossen_Apostolov_(PDC)|Rossen]] &amp;amp; [[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 13:40 SNIC update and news (Jacko Koster)&lt;br /&gt;
* 14:00 PRACE-5IP outlook ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 14:15 WP5 in a nutshell ([[User:Gert_Svensson(PDC)|Gert]], [[User:Andreas_Johansson_NSC)|Andreas]])&lt;br /&gt;
* 14:30 WP7 exchange session: [[User:Chandan_Basu_(NSC)|Chandan]], [[User:Mikael_R%C3%A4nnar_(HPC2N)|Mikael]], [[User:Michael_Schliephake_(PDC)|Michael]] (10mins each)&lt;br /&gt;
* 15:00 Open discussion&lt;br /&gt;
* 15:30 End&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
-&amp;gt; 11 people (http://doodle.com/poll/bc8x7ftvgpggyqrw)&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=PRACE_Sweden_F2F_160524&amp;diff=6243</id>
		<title>PRACE Sweden F2F 160524</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=PRACE_Sweden_F2F_160524&amp;diff=6243"/>
		<updated>2016-04-15T16:21:26Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;PRACE Sweden F2F meeting on May 25th at PDC&lt;br /&gt;
&lt;br /&gt;
Timing: 9:30 - 15:30 to allow for travelling. &lt;br /&gt;
&lt;br /&gt;
Location: Room 304 (3rd floor), Teknikringen 14, Stockholm, KTH &lt;br /&gt;
If you are there much earlier, wait in the PDC kitchen on the 4th floor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Agenda=&lt;br /&gt;
&lt;br /&gt;
* 9.30 Welcome ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 9:40 Information on (past and upcoming) PRACE calls and DECI ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:00 PRACE Social Media Statistics and Promotion of useful services in PRACE ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:20 SHAPE overview ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:35 SHAPE progress ([[User:Jing_Gong_(PDC)|Jing]])&lt;br /&gt;
* 10:50 PRACE EUDAT connections (MoU, HiResClimate) ([[User:Dejan_Vitlacil_(PDC)|Dejan]])&lt;br /&gt;
* 11:15 Status PRACE operations ([[User:Cristian_Cira_(PDC)|Cristian]])&lt;br /&gt;
&lt;br /&gt;
Lunch Break&lt;br /&gt;
&lt;br /&gt;
* 13:00 BioExcel CoE ([[User:Rossen_Apostolov_(PDC)|Rossen]])&lt;br /&gt;
* 13:30 Planningstatus for the Spring School 2017 ([[User:Rossen_Apostolov_(PDC)|Rossen]] &amp;amp; [[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 13:40 SNIC update and news (Jacko Koster)&lt;br /&gt;
* 14:00 PRACE-5IP outlook ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 14:15 WP5 in a nutshell ([[User:Gert_Svensson(PDC)|Gert]], [[User:Andreas_Johansson_NSC)|Andreas]])&lt;br /&gt;
* 14:30 WP7 exchange session: [[User:Chandan_Basu_(NSC)|Chandan]], [[User:Mikael_R%C3%A4nnar_(HPC2N)|Mikael]], [[User:Michael_Schliephake_(PDC)|Michael]] (10mins each)&lt;br /&gt;
* 15:00 Open discussion&lt;br /&gt;
* 15:30 End&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
-&amp;gt; 11 people (http://doodle.com/poll/bc8x7ftvgpggyqrw)&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=PRACE_Sweden_F2F_160524&amp;diff=6242</id>
		<title>PRACE Sweden F2F 160524</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=PRACE_Sweden_F2F_160524&amp;diff=6242"/>
		<updated>2016-04-15T12:12:29Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;PRACE Sweden F2F meeting on May 25th at PDC&lt;br /&gt;
&lt;br /&gt;
Timing: 9:30 - 15:30 to allow for travelling. &lt;br /&gt;
&lt;br /&gt;
Location: Room 304 (3rd floor), Teknikringen 14, Stockholm, KTH &lt;br /&gt;
If you are there much earlier, wait in the PDC kitchen on the 4th floor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Agenda=&lt;br /&gt;
&lt;br /&gt;
* 9.30 Welcome ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 9:40 Information on (past and upcoming) PRACE calls and DECI ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:00 PRACE Social Media Statistics and Promotion of useful services in PRACE ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:20 SHAPE overview ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:35 SHAPE progress ([[User:Jing_Gong_(PDC)|Jing]])&lt;br /&gt;
* 10:50 PRACE EUDAT connections (MoU, HiResClimate) ([[User:Dejan_Vitlacil_(PDC)|Dejan]])&lt;br /&gt;
* 11:15 Status PRACE operations ([[User:Cristian_Cira_(PDC)|Cristian]])&lt;br /&gt;
&lt;br /&gt;
Lunch Break&lt;br /&gt;
&lt;br /&gt;
* 13:00 BioExcel CoE ([[User:Rossen_Apostolov_(PDC)|Rossen]])&lt;br /&gt;
* 13:30 Planningstatus for the Spring School 2017 ([[User:Rossen_Apostolov_(PDC)|Rossen]] &amp;amp; [[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 13:40 SNIC update and news (Ann-Charlotte Sonnhammer/Jacko Koster)&lt;br /&gt;
* 14:00 PRACE-5IP outlook ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 14:15 WP5 in a nutshell ([[User:Gert_Svensson(PDC)|Gert]], [[User:Andreas_Johansson_NSC)|Andreas]])&lt;br /&gt;
* 14:30 WP7 exchange session: [[User:Chandan_Basu_(NSC)|Chandan]], [[User:Mikael_R%C3%A4nnar_(HPC2N)|Mikael]], [[User:Michael_Schliephake_(PDC)|Michael]] (10mins each)&lt;br /&gt;
* 15:00 Open discussion&lt;br /&gt;
* 15:30 End&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
-&amp;gt; 11 people (http://doodle.com/poll/bc8x7ftvgpggyqrw)&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=PRACE_Sweden_F2F_160524&amp;diff=6241</id>
		<title>PRACE Sweden F2F 160524</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=PRACE_Sweden_F2F_160524&amp;diff=6241"/>
		<updated>2016-04-15T12:03:04Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): Created page with &amp;quot;PRACE Sweden F2F meeting on May 25th at PDC  Timing: 9:30 - 15:30 to allow for travelling.   Location: Room 304 (3rd floor), Teknikringen 14, Stockholm, KTH  If you are there muc...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;PRACE Sweden F2F meeting on May 25th at PDC&lt;br /&gt;
&lt;br /&gt;
Timing: 9:30 - 15:30 to allow for travelling. &lt;br /&gt;
&lt;br /&gt;
Location: Room 304 (3rd floor), Teknikringen 14, Stockholm, KTH &lt;br /&gt;
If you are there much earlier, wait in the PDC kitchen on the 4th floor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Agenda=&lt;br /&gt;
&lt;br /&gt;
* 9.30 Welcome ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 9:40 Information on (past and upcoming) PRACE calls and DECI ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:00 PRACE Social Media Statistics and Promotion of useful services in PRACE ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:20 SHAPE overview ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 10:35 SHAPE progress ([[User:Jing_Gong_(PDC)|Jing]])&lt;br /&gt;
* 10:50 PRACE EUDAT connections (MoU, HiResClimate) ([[User:Dejan_Vitlacil_(PDC)|Dejan]])&lt;br /&gt;
* 11:15 Status PRACE operations ([[User:Cristian_Cira_(PDC)|Cristian]])&lt;br /&gt;
&lt;br /&gt;
Lunch Break&lt;br /&gt;
&lt;br /&gt;
* 13:00 BioExcel CoE ([[User:Rossen_Apostolov_(PDC)|Rossen]])&lt;br /&gt;
* 13:30 Planningstatus for the Spring School 2017 ([[User:Rossen_Apostolov_(PDC)|Rossen]] &amp;amp; [[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 13:40 SNIC update and news (Ann-Charlotte Sonnhammer/Jacko Koster)&lt;br /&gt;
* 14:00 PRACE-5IP status update ([[User:Michaela_Barth_(PDC)|Michaela]])&lt;br /&gt;
* 14:15 WP5 in a nutshell ([[User:Gert_Svensson(PDC)|Gert]], [[User:Andreas_Johansson_NSC)|Andreas]])&lt;br /&gt;
* 14:30 WP7 exchange session: [[User:Chandan_Basu_(NSC)|Chandan]], [[User:Mikael_R%C3%A4nnar_(HPC2N)|Mikael]], [[User:Michael_Schliephake_(PDC)|Michael]] (10mins each)&lt;br /&gt;
* 15:00 Open discussion&lt;br /&gt;
* 15:30 End&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
-&amp;gt; 11 people (http://doodle.com/poll/bc8x7ftvgpggyqrw)&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=PRACE&amp;diff=6240</id>
		<title>PRACE</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=PRACE&amp;diff=6240"/>
		<updated>2016-04-15T11:35:14Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.prace-ri.eu/ The Partnership for Advanced Computing in Europe] prepares the creation of a persistent pan-European HPC service, consisting several Tier-0 centres providing European researchers with access to capability computers and forming the top level of the European HPC ecosystem. It is a part of European FP7 (Framework Programme) project and consists of several IPs (Implementation Phases) which are individually scheduled for about 2 years periods. &lt;br /&gt;
&lt;br /&gt;
*PRACE1IP (2010-07-01 until 2012-07-01) &lt;br /&gt;
*PRACE2IP (2011-0701/resp. 2011-09-01 until 2013-09-01)&lt;br /&gt;
*PRACE 2IP Extension (2013-09-01 until 2014-08-31) &lt;br /&gt;
*PRACE3IP (2012-07-01 until 2014-06-30)&lt;br /&gt;
*PRACE4IP (2015-02-01 until 2017-04-30)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings:&lt;br /&gt;
*[[PRACE Sweden F2F 160524]]&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=PRACE&amp;diff=6239</id>
		<title>PRACE</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=PRACE&amp;diff=6239"/>
		<updated>2016-04-15T11:32:57Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.prace-ri.eu/ The Partnership for Advanced Computing in Europe] prepares the creation of a persistent pan-European HPC service, consisting several Tier-0 centres providing European researchers with access to capability computers and forming the top level of the European HPC ecosystem. It is a part of European FP7 (Framework Programme) project and consists of several IPs (Implementation Phases) which are individually scheduled for about 2 years periods. &lt;br /&gt;
&lt;br /&gt;
*PRACE1IP (2010-07-01 until 2012-07-01) &lt;br /&gt;
*PRACE2IP (2011-0701/resp. 2011-09-01 until 2013-09-01)&lt;br /&gt;
*PRACE 2IP Extension (2013-09-01 until 2014-08-31) &lt;br /&gt;
*PRACE3IP (2012-07-01 until 2014-06-30)&lt;br /&gt;
*PRACE4IP (2015-02-01 until 2017-04-30)&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=PRACE&amp;diff=6238</id>
		<title>PRACE</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=PRACE&amp;diff=6238"/>
		<updated>2016-04-15T11:32:47Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.prace-ri.eu/ The Partnership for Advanced Computing in Europe] prepares the creation of a persistent pan-European HPC service, consisting several Tier-0 centres providing European researchers with access to capability computers and forming the top level of the European HPC ecosystem. It is a part of European FP7 (Framework Programme) project and consists of several IPs (Implementation Phases) which are individually scheduled for about 2 years periods. &lt;br /&gt;
&lt;br /&gt;
*PRACE1IP (2010-07-01 until 2012-07-01) &lt;br /&gt;
*PRACE2IP (2011-0701/resp. 2011-09-01 until 2013-09-01)&lt;br /&gt;
PRACE 2IP Extension (2013-09-01 until 2014-08-31) &lt;br /&gt;
*PRACE3IP (2012-07-01 until 2014-06-30)&lt;br /&gt;
*PRACE4IP (2015-02-01 until 2017-04-30)&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=User:Michaela_Barth_(PDC)&amp;diff=6237</id>
		<title>User:Michaela Barth (PDC)</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=User:Michaela_Barth_(PDC)&amp;diff=6237"/>
		<updated>2016-04-15T11:28:42Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): Created page with &amp;quot;[http://www.kth.se/profile/caela/]&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.kth.se/profile/caela/]&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=Grid_certificates&amp;diff=5140</id>
		<title>Grid certificates</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=Grid_certificates&amp;diff=5140"/>
		<updated>2013-04-25T15:00:33Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): /* Introduction to certificates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Grid computing]]&lt;br /&gt;
[[Category:SweGrid user guide]]&lt;br /&gt;
[[Category:SweStore]]&lt;br /&gt;
[[Category:SweStore user guide]]&lt;br /&gt;
[[Getting started with SweGrid|&amp;lt; Getting started with SweGrid]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[SweStore|&amp;lt; SweStore]]&lt;br /&gt;
&lt;br /&gt;
=Introduction to certificates=&lt;br /&gt;
&lt;br /&gt;
In order to get access to computer and storage resources on the grid or [[SweStore]] you must have a valid (grid) certificate. This certificate is used instead of a username and password when accessing the resource. The resource have a certificate that tells you that you have contacted the right resource. This is exactly the same mechanism used when you use a web browser to contact your bank.&lt;br /&gt;
&lt;br /&gt;
A certificate is the similar to a passport in real-life. In the same way you have prove your credentials when you acquire a passport the same is true for a certificate. A third party, the Certificate Authority or CA, that both you and the resource trust has to vouch for your identity and sign your certificate.&lt;br /&gt;
&lt;br /&gt;
A certificate consist of a public key, some user information and a signature of the CA. In addition to the certificate you have a private key. The private key is secret and should be kept as secure as possible.&lt;br /&gt;
&lt;br /&gt;
For more information regarding certificates and public key cryptography:&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public-key_cryptography http://en.wikipedia.org/wiki/Public-key_cryptography]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public_key_certificate http://en.wikipedia.org/wiki/Public_key_certificate]&lt;br /&gt;
&lt;br /&gt;
[http://www.nordugrid.org/documents/certificate_howto.html http://www.nordugrid.org/documents/certificate_howto.html]&lt;br /&gt;
&lt;br /&gt;
* The grid certificate and the private key are stored in your web browser and/or located in ~/.globus at the host(s) from where you will be accessing the resource:&lt;br /&gt;
      usercert.pem&lt;br /&gt;
      userkey.pem&lt;br /&gt;
* The certificate contains your public key, your name and organization and a signature by the CA. It is does not contain any username.&lt;br /&gt;
* The certificate is valid for 13 month and should be renewed yearly.&lt;br /&gt;
* The private key should be handled with great care. It should only be readable by you and not by the group or others (i.e. ``chmod 400 userkey.pem''). Store the key on trusted computers and transfer the key between computers using encryption (using for example scp).&lt;br /&gt;
* On shared file systems make sure that ~/.globus is not readible by everybody:&lt;br /&gt;
 chmod 700 ~/.globus&lt;br /&gt;
and on AFS:&lt;br /&gt;
 fs sa ~/.globus system:anyuser none&lt;br /&gt;
* The private key is encrypted using a passphrase. Anyone that can decrypt the private key will be able to authenticate as you to grid resources. This is similar to the private key in SSH. You must choose a strong passphrase for the private key. This passphrase must not be used anywhere else. You must never ever give away the passphrase to somebody else.&lt;br /&gt;
* You should not share the certificate with someone. It's personal. &lt;br /&gt;
&lt;br /&gt;
For more information regarding certificates and public key cryptography:&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public-key_cryptography http://en.wikipedia.org/wiki/Public-key_cryptography]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public_key_certificate http://en.wikipedia.org/wiki/Public_key_certificate]&lt;br /&gt;
&lt;br /&gt;
= Requesting a certificate =&lt;br /&gt;
&lt;br /&gt;
Certificates are issued by a Certificate Authority or CA. For Swedish users there are two relevant CA:s that can issue grid/eScience certificates, Terena and Nordugrid. The Terena CA is preferred if it is available for your university or research group, but many sites has not enabled this service yet. The Nordugrid CA can also be used but requires more manual work by all parties.&lt;br /&gt;
&lt;br /&gt;
Recommended procedure for each university:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
| University&lt;br /&gt;
| CA&lt;br /&gt;
| Specific instructions&lt;br /&gt;
|-&lt;br /&gt;
| LU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[LU_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| LiU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[LiU_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| CTH&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[Chalmers_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| GU&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[GU_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| UU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[UU_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| KTH&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[KTH_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| SU&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[SU_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| KI&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[KI_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| UmU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[UmU_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Requesting a grid certificate using the Terena eScience Portal|Instructions for the Terena CA]]&lt;br /&gt;
&lt;br /&gt;
[[Requesting a grid certificate from the Nordugrid CA|Instructions for the NorduGrid CA (use only if Terena eScience isn't available at your site)]]&lt;br /&gt;
&lt;br /&gt;
= Requesting membership in the SweGrid VO =&lt;br /&gt;
&lt;br /&gt;
SweGrid and SweStore resources are currently being allocated for VO:s, virtual organizations, rather than individual users. A VO is basically just a list of users. To be able to use a SweGrid or SweStore resource a membership in the SweGrid VO (virtual organization) and a corresponding subgroup is required. To apply for membership, make sure that the NorduGrid root CA certificate and your personal certificate is installed in the browser. &lt;br /&gt;
&lt;br /&gt;
The NorduGrid CA cert can be installed by clicking on the following link:&lt;br /&gt;
&lt;br /&gt;
 [http://ca.nordugrid.org/cacrt.crt http://ca.nordugrid.org/cacrt.crt]&lt;br /&gt;
&lt;br /&gt;
Make sure you check the &amp;quot;Trust this CA to identify web sites.&amp;quot; boxes in the dialog shown.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:certinstall.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When certificates have been installed in the browser go to the following URL:&lt;br /&gt;
&lt;br /&gt;
 [https://voms.ndgf.org:8443/voms/swegrid.se https://voms.ndgf.org:8443/voms/swegrid.se]&lt;br /&gt;
&lt;br /&gt;
and follow the instructions. In a couple of hours you will be added to the SweGrid VO. &lt;br /&gt;
&lt;br /&gt;
To be added to the correct SweGrid project send a mail to [mailto:support@swegrid.se support@swegrid.se] and specify your DN as shown in the Terena portal or from the '''arcproxy --info''' command and which SNIC-project to be added to.&lt;br /&gt;
&lt;br /&gt;
To be added to the correct Swestore allocation send a mail to [mailto:swestore-support@snic.vr.se swestore-support@snic.vr.se] and specify your DN as shown in the Terena portal or from the '''arcproxy --info''' command and which Swestore allocation to be added to.&lt;br /&gt;
&lt;br /&gt;
= Proxy certificates =&lt;br /&gt;
&lt;br /&gt;
Authentication on the grid is done using special short lived ''proxy'' certificates. There are several tools available for creating, checking and destroying these proxy certificates.&lt;br /&gt;
 &lt;br /&gt;
== Creating a proxy certificate ==&lt;br /&gt;
&lt;br /&gt;
To create a short lived proxy that can be used for authentication with grid services, the '''arcproxy''' command can be used. A 12 hour (default) proxy is created in the following example:&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy&lt;br /&gt;
 Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Enter pass phrase for /home/kalle/.globus/userkey.pem:&lt;br /&gt;
 .++++++&lt;br /&gt;
 .....++++++&lt;br /&gt;
 Proxy generation succeeded&lt;br /&gt;
 Your proxy is valid until: 2011-03-11 03:00:14&lt;br /&gt;
&lt;br /&gt;
The proxy file itself will be created in the '''/tmp''' directory with the format '''x509up_uid''', where uid is the user id number for your account.&lt;br /&gt;
&lt;br /&gt;
In some cases a longer lived proxy will be needed. This is achieved using the '''--constraint''' switch. A 24-hour can be created by issuing the following command:&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy --constraint=&amp;quot;validityPeriod=24H&amp;quot;&lt;br /&gt;
 Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Enter pass phrase for /home/kalle/.globus/userkey.pem:&lt;br /&gt;
 ....++++++&lt;br /&gt;
 .....++++++&lt;br /&gt;
 Proxy generation succeeded&lt;br /&gt;
 Your proxy is valid until: 2011-03-11 15:03:19&lt;br /&gt;
&lt;br /&gt;
== Checking proxy lifetime ==&lt;br /&gt;
&lt;br /&gt;
The remaining lifetime of a proxy certificate can be checked using the '''arcproxy''' command with the '''--info''' switch.&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy --info&lt;br /&gt;
 Subject: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula/CN=1567862803&lt;br /&gt;
 Identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Time left for proxy: 11 hours 55 minutes&lt;br /&gt;
 Proxy path: /tmp/x509up_u500&lt;br /&gt;
 Proxy type: X.509 Proxy Certificate Profile RFC compliant restricted proxy&lt;br /&gt;
&lt;br /&gt;
In this example the proxy certificate is valid for 11 hours 55 minutes more.&lt;br /&gt;
&lt;br /&gt;
== Destroying a proxy certificate ==&lt;br /&gt;
&lt;br /&gt;
A proxy can be destroyed with the '''-r''' or '''--remove''' switch.&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy -r&lt;br /&gt;
&lt;br /&gt;
or&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy --remove&lt;br /&gt;
&lt;br /&gt;
= VOMS certificates =&lt;br /&gt;
&lt;br /&gt;
As long as you are a member of only one VO or VO group, you can&lt;br /&gt;
authenticate to a grid service with the regular grid proxy certificate&lt;br /&gt;
as defined in the previous section. If you are a member of more than&lt;br /&gt;
one VO or VO group you may want to select which membership you want to&lt;br /&gt;
be authenticated as. For example, if you are a member of&lt;br /&gt;
''swegrid.se:/swegrid.se/ops'' (operations staff) and&lt;br /&gt;
''swegrid.se:/swegrid.se/bils'' and want to write a file, who should&lt;br /&gt;
be the owner? Ops or bils? You need to provide some additional&lt;br /&gt;
information. In the grid world this is done with a voms proxy&lt;br /&gt;
certificate which basically is a regular proxy certificate but with a&lt;br /&gt;
so called voms extension that contains a list of your VO group&lt;br /&gt;
memberships (and roles and attributes, which we don't use in&lt;br /&gt;
Swegrid/Swestore at the moment).&lt;br /&gt;
&lt;br /&gt;
'''Please note, if you only have one membership you can skip this section!'''&lt;br /&gt;
&lt;br /&gt;
The voms extension of the certificate is signed by the virtual&lt;br /&gt;
organization management server, or VOMS server. The same VOMS server&lt;br /&gt;
you used when applying for the swegrid.se VO membership in the first&lt;br /&gt;
place. To enable this signing process you need to add a few&lt;br /&gt;
configuration files to your system. First add this to the file&lt;br /&gt;
'''/etc/vomses''':&lt;br /&gt;
&lt;br /&gt;
   &amp;quot;swegrid.se&amp;quot; &amp;quot;voms.ndgf.org&amp;quot; &amp;quot;15009&amp;quot; &amp;quot;/O=Grid/O=NorduGrid/CN=host/voms.ndgf.org&amp;quot; &amp;quot;swegrid.se&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Next create the necessary directories and the file&lt;br /&gt;
'''/etc/grid-security/vomsdir/swegrid.se/voms.ndgf.org.lsc''' with the&lt;br /&gt;
following contents:&lt;br /&gt;
&lt;br /&gt;
   /O=Grid/O=NorduGrid/CN=host/voms.ndgf.org&lt;br /&gt;
   /O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority&lt;br /&gt;
&lt;br /&gt;
== Creating a VOMS proxy ==&lt;br /&gt;
&lt;br /&gt;
VOMS proxies in ARC1 can be created using the '''arcproxy''' command&lt;br /&gt;
and the '''-S''' or '''--voms''' switches as shown in the following&lt;br /&gt;
example (if you are a member of the /swegrid.se/ops group. Adjust as&lt;br /&gt;
necessary):&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy -S swegrid.se:/swegrid.se/ops&lt;br /&gt;
 Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Enter pass phrase for /home/kalle/.globus/userkey.pem:&lt;br /&gt;
 .....++++++&lt;br /&gt;
 ............++++++&lt;br /&gt;
 Contacting VOMS server (named swegrid.se): voms.ndgf.org on port: 15009&lt;br /&gt;
 Proxy generation succeeded&lt;br /&gt;
 Your proxy is valid until: 2011-03-10 23:33:06&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Signing your e-mail with your certificate =&lt;br /&gt;
&lt;br /&gt;
First, you will need your grid certificate in PKCS12 format:&lt;br /&gt;
== How to transform your certificate from PEM format into PKCS#12 format ==&lt;br /&gt;
&lt;br /&gt;
This is how you transform your cert into PKCS12 format that can be used within your webbrowser or email send program:&lt;br /&gt;
You first will have to change directory into where you created and keep the certificate, historically this is often in ~/.globus&lt;br /&gt;
	 &lt;br /&gt;
 openssl pkcs12 -export -in usercert.pem -inkey userkey.pem -out cert+key.p12	 &lt;br /&gt;
&lt;br /&gt;
First you will have to enter the password you used for your private key, then you will be asked for a new password to protect the new file. '''cert+key.p12 contains your private key, and is therefore 'lika känslig' as userkey.pem'''. See also [[#Introduction to certificates]]. Security wise the safest way is to delete the PKCS12 file after having imported it into your mail client or browser. Don't forget this.&lt;br /&gt;
&lt;br /&gt;
Remarks: openssl will either need the variable RANDFILE to be set or that ~/.rnd is writable. So you have to make sure that the current $HOME is yours if you have pagshed away, otherwise the command will fail with ''unable to write 'random state''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Signing in mew ===&lt;br /&gt;
&lt;br /&gt;
Mew uses gpgsm. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Import the nordugrid root cert&lt;br /&gt;
&lt;br /&gt;
1.1. get 1f0e8352.0 from nordugrid web&lt;br /&gt;
&lt;br /&gt;
1.2. gpgsm --import 1f0e8352.0&lt;br /&gt;
&lt;br /&gt;
1.2. Make it trusted:&lt;br /&gt;
     gpgsm --list-keys 2&amp;gt;/dev/null | grep fingerprint | awk '{print $2 &amp;quot; S&amp;quot;}' | grep THE-FINGERPRIT-YOU-WANT &amp;gt;&amp;gt; .gnupg/trustlist.txt&lt;br /&gt;
&lt;br /&gt;
2. Add your own key from the cert+key.p12 file in this case&lt;br /&gt;
&lt;br /&gt;
2.1 openssl pkcs12 -in cert+key.p12 -out tmp.pem -nokeys&lt;br /&gt;
&lt;br /&gt;
2.2. gpgsm --import tmp.pem ; rm tmp.pem&lt;br /&gt;
&lt;br /&gt;
2.3. Tell gpgsm not to use revocation lists (bad bad security)&lt;br /&gt;
     echo disable-crl-checks &amp;gt;&amp;gt; .gnupg/gpgsm.conf&lt;br /&gt;
&lt;br /&gt;
3. Test&lt;br /&gt;
   gpgsm --detach-sign file &amp;gt; sign  # should ask for passphrase and give some kind of sign file&lt;br /&gt;
&lt;br /&gt;
4. Use:&lt;br /&gt;
   C-uC-cC-s  then enter your email address (must match email in cert) and passphrase&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Signing in thunderbird ===&lt;br /&gt;
In thunderbird: options/security/digitally sign this message.&lt;br /&gt;
&lt;br /&gt;
If you do this for the first time and haven't defined yet the certificate to sign with, thunderbird will pop up the according preferences [Account settings/Security], where you can choose between your imported certificates in PKCS12 format.&lt;br /&gt;
&lt;br /&gt;
In the beginning, of course, you haven't imported any: Click there on the same preferences tab that popped up on [View Certificates]. In the new window that opens you can import the certificate.&lt;br /&gt;
&lt;br /&gt;
Afterwards you can then choose this certificate to be used for signing and for encryption for this email account.&lt;br /&gt;
&lt;br /&gt;
Don't forget to actually check that you then really sign the corresponding mail.&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=Grid_certificates&amp;diff=5139</id>
		<title>Grid certificates</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=Grid_certificates&amp;diff=5139"/>
		<updated>2013-04-25T14:55:52Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): /* How to transform your certificate from PEM format into PKCS#12 format */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Grid computing]]&lt;br /&gt;
[[Category:SweGrid user guide]]&lt;br /&gt;
[[Category:SweStore]]&lt;br /&gt;
[[Category:SweStore user guide]]&lt;br /&gt;
[[Getting started with SweGrid|&amp;lt; Getting started with SweGrid]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[SweStore|&amp;lt; SweStore]]&lt;br /&gt;
&lt;br /&gt;
=Introduction to certificates=&lt;br /&gt;
&lt;br /&gt;
In order to get access to computer and storage resources on the grid or [[SweStore]] you must have a valid (grid) certificate. This certificate is used instead of a username and password when accessing the resource. The resource have a certificate that tells you that you have contacted the right resource. This is exactly the same mechanism used when you use a web browser to contact your bank.&lt;br /&gt;
&lt;br /&gt;
A certificate is the similar to a passport in real-life. In the same way you have prove your credentials when you acquire a passport the same is true for a certificate. A third party, the Certificate Authority or CA, that both you and the resource trust has to vouch for your identity and sign your certificate.&lt;br /&gt;
&lt;br /&gt;
A certificate consist of a public key, some user information and a signature of the CA. In addition to the certificate you have a private key. The private key is secret and should be kept as secure as possible.&lt;br /&gt;
&lt;br /&gt;
For more information regarding certificates and public key cryptography:&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public-key_cryptography http://en.wikipedia.org/wiki/Public-key_cryptography]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public_key_certificate http://en.wikipedia.org/wiki/Public_key_certificate]&lt;br /&gt;
&lt;br /&gt;
[http://www.nordugrid.org/documents/certificate_howto.html http://www.nordugrid.org/documents/certificate_howto.html]&lt;br /&gt;
&lt;br /&gt;
* The grid certificate and the private key are stored in your web browser and/or located in ~/.globus at the host(s) from where you will be accessing the resource:&lt;br /&gt;
      usercert.pem&lt;br /&gt;
      userkey.pem&lt;br /&gt;
* The certificate contains your public key, your name and organization and a signature by the CA. It is does not contain any username.&lt;br /&gt;
* The certificate is valid for 13 month and should be renewed yearly.&lt;br /&gt;
* The private key should be handled with great care. It should only be readable by you (i.e. ``chmod 400 userkey.pem''). Store the key on trusted computers and transfer the key between computers using encryption (using for example scp).&lt;br /&gt;
* The private key is encrypted using a passphrase. Anyone that can decrypt the private key will be able to authenticate as you to grid resources. This is similar to the private key in SSH. You must choose a strong passphrase for the private key. This passphrase must not be used anywhere else. You must never ever give away the passphrase to somebody else.&lt;br /&gt;
* You should not share the certificate with someone. It's personal. &lt;br /&gt;
&lt;br /&gt;
For more information regarding certificates and public key cryptography:&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public-key_cryptography http://en.wikipedia.org/wiki/Public-key_cryptography]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public_key_certificate http://en.wikipedia.org/wiki/Public_key_certificate]&lt;br /&gt;
&lt;br /&gt;
= Requesting a certificate =&lt;br /&gt;
&lt;br /&gt;
Certificates are issued by a Certificate Authority or CA. For Swedish users there are two relevant CA:s that can issue grid/eScience certificates, Terena and Nordugrid. The Terena CA is preferred if it is available for your university or research group, but many sites has not enabled this service yet. The Nordugrid CA can also be used but requires more manual work by all parties.&lt;br /&gt;
&lt;br /&gt;
Recommended procedure for each university:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
| University&lt;br /&gt;
| CA&lt;br /&gt;
| Specific instructions&lt;br /&gt;
|-&lt;br /&gt;
| LU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[LU_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| LiU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[LiU_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| CTH&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[Chalmers_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| GU&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[GU_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| UU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[UU_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| KTH&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[KTH_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| SU&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[SU_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| KI&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[KI_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| UmU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[UmU_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Requesting a grid certificate using the Terena eScience Portal|Instructions for the Terena CA]]&lt;br /&gt;
&lt;br /&gt;
[[Requesting a grid certificate from the Nordugrid CA|Instructions for the NorduGrid CA (use only if Terena eScience isn't available at your site)]]&lt;br /&gt;
&lt;br /&gt;
= Requesting membership in the SweGrid VO =&lt;br /&gt;
&lt;br /&gt;
SweGrid and SweStore resources are currently being allocated for VO:s, virtual organizations, rather than individual users. A VO is basically just a list of users. To be able to use a SweGrid or SweStore resource a membership in the SweGrid VO (virtual organization) and a corresponding subgroup is required. To apply for membership, make sure that the NorduGrid root CA certificate and your personal certificate is installed in the browser. &lt;br /&gt;
&lt;br /&gt;
The NorduGrid CA cert can be installed by clicking on the following link:&lt;br /&gt;
&lt;br /&gt;
 [http://ca.nordugrid.org/cacrt.crt http://ca.nordugrid.org/cacrt.crt]&lt;br /&gt;
&lt;br /&gt;
Make sure you check the &amp;quot;Trust this CA to identify web sites.&amp;quot; boxes in the dialog shown.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:certinstall.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When certificates have been installed in the browser go to the following URL:&lt;br /&gt;
&lt;br /&gt;
 [https://voms.ndgf.org:8443/voms/swegrid.se https://voms.ndgf.org:8443/voms/swegrid.se]&lt;br /&gt;
&lt;br /&gt;
and follow the instructions. In a couple of hours you will be added to the SweGrid VO. &lt;br /&gt;
&lt;br /&gt;
To be added to the correct SweGrid project send a mail to [mailto:support@swegrid.se support@swegrid.se] and specify your DN as shown in the Terena portal or from the '''arcproxy --info''' command and which SNIC-project to be added to.&lt;br /&gt;
&lt;br /&gt;
To be added to the correct Swestore allocation send a mail to [mailto:swestore-support@snic.vr.se swestore-support@snic.vr.se] and specify your DN as shown in the Terena portal or from the '''arcproxy --info''' command and which Swestore allocation to be added to.&lt;br /&gt;
&lt;br /&gt;
= Proxy certificates =&lt;br /&gt;
&lt;br /&gt;
Authentication on the grid is done using special short lived ''proxy'' certificates. There are several tools available for creating, checking and destroying these proxy certificates.&lt;br /&gt;
 &lt;br /&gt;
== Creating a proxy certificate ==&lt;br /&gt;
&lt;br /&gt;
To create a short lived proxy that can be used for authentication with grid services, the '''arcproxy''' command can be used. A 12 hour (default) proxy is created in the following example:&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy&lt;br /&gt;
 Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Enter pass phrase for /home/kalle/.globus/userkey.pem:&lt;br /&gt;
 .++++++&lt;br /&gt;
 .....++++++&lt;br /&gt;
 Proxy generation succeeded&lt;br /&gt;
 Your proxy is valid until: 2011-03-11 03:00:14&lt;br /&gt;
&lt;br /&gt;
The proxy file itself will be created in the '''/tmp''' directory with the format '''x509up_uid''', where uid is the user id number for your account.&lt;br /&gt;
&lt;br /&gt;
In some cases a longer lived proxy will be needed. This is achieved using the '''--constraint''' switch. A 24-hour can be created by issuing the following command:&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy --constraint=&amp;quot;validityPeriod=24H&amp;quot;&lt;br /&gt;
 Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Enter pass phrase for /home/kalle/.globus/userkey.pem:&lt;br /&gt;
 ....++++++&lt;br /&gt;
 .....++++++&lt;br /&gt;
 Proxy generation succeeded&lt;br /&gt;
 Your proxy is valid until: 2011-03-11 15:03:19&lt;br /&gt;
&lt;br /&gt;
== Checking proxy lifetime ==&lt;br /&gt;
&lt;br /&gt;
The remaining lifetime of a proxy certificate can be checked using the '''arcproxy''' command with the '''--info''' switch.&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy --info&lt;br /&gt;
 Subject: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula/CN=1567862803&lt;br /&gt;
 Identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Time left for proxy: 11 hours 55 minutes&lt;br /&gt;
 Proxy path: /tmp/x509up_u500&lt;br /&gt;
 Proxy type: X.509 Proxy Certificate Profile RFC compliant restricted proxy&lt;br /&gt;
&lt;br /&gt;
In this example the proxy certificate is valid for 11 hours 55 minutes more.&lt;br /&gt;
&lt;br /&gt;
== Destroying a proxy certificate ==&lt;br /&gt;
&lt;br /&gt;
A proxy can be destroyed with the '''-r''' or '''--remove''' switch.&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy -r&lt;br /&gt;
&lt;br /&gt;
or&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy --remove&lt;br /&gt;
&lt;br /&gt;
= VOMS certificates =&lt;br /&gt;
&lt;br /&gt;
As long as you are a member of only one VO or VO group, you can&lt;br /&gt;
authenticate to a grid service with the regular grid proxy certificate&lt;br /&gt;
as defined in the previous section. If you are a member of more than&lt;br /&gt;
one VO or VO group you may want to select which membership you want to&lt;br /&gt;
be authenticated as. For example, if you are a member of&lt;br /&gt;
''swegrid.se:/swegrid.se/ops'' (operations staff) and&lt;br /&gt;
''swegrid.se:/swegrid.se/bils'' and want to write a file, who should&lt;br /&gt;
be the owner? Ops or bils? You need to provide some additional&lt;br /&gt;
information. In the grid world this is done with a voms proxy&lt;br /&gt;
certificate which basically is a regular proxy certificate but with a&lt;br /&gt;
so called voms extension that contains a list of your VO group&lt;br /&gt;
memberships (and roles and attributes, which we don't use in&lt;br /&gt;
Swegrid/Swestore at the moment).&lt;br /&gt;
&lt;br /&gt;
'''Please note, if you only have one membership you can skip this section!'''&lt;br /&gt;
&lt;br /&gt;
The voms extension of the certificate is signed by the virtual&lt;br /&gt;
organization management server, or VOMS server. The same VOMS server&lt;br /&gt;
you used when applying for the swegrid.se VO membership in the first&lt;br /&gt;
place. To enable this signing process you need to add a few&lt;br /&gt;
configuration files to your system. First add this to the file&lt;br /&gt;
'''/etc/vomses''':&lt;br /&gt;
&lt;br /&gt;
   &amp;quot;swegrid.se&amp;quot; &amp;quot;voms.ndgf.org&amp;quot; &amp;quot;15009&amp;quot; &amp;quot;/O=Grid/O=NorduGrid/CN=host/voms.ndgf.org&amp;quot; &amp;quot;swegrid.se&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Next create the necessary directories and the file&lt;br /&gt;
'''/etc/grid-security/vomsdir/swegrid.se/voms.ndgf.org.lsc''' with the&lt;br /&gt;
following contents:&lt;br /&gt;
&lt;br /&gt;
   /O=Grid/O=NorduGrid/CN=host/voms.ndgf.org&lt;br /&gt;
   /O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority&lt;br /&gt;
&lt;br /&gt;
== Creating a VOMS proxy ==&lt;br /&gt;
&lt;br /&gt;
VOMS proxies in ARC1 can be created using the '''arcproxy''' command&lt;br /&gt;
and the '''-S''' or '''--voms''' switches as shown in the following&lt;br /&gt;
example (if you are a member of the /swegrid.se/ops group. Adjust as&lt;br /&gt;
necessary):&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy -S swegrid.se:/swegrid.se/ops&lt;br /&gt;
 Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Enter pass phrase for /home/kalle/.globus/userkey.pem:&lt;br /&gt;
 .....++++++&lt;br /&gt;
 ............++++++&lt;br /&gt;
 Contacting VOMS server (named swegrid.se): voms.ndgf.org on port: 15009&lt;br /&gt;
 Proxy generation succeeded&lt;br /&gt;
 Your proxy is valid until: 2011-03-10 23:33:06&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Signing your e-mail with your certificate =&lt;br /&gt;
&lt;br /&gt;
First, you will need your grid certificate in PKCS12 format:&lt;br /&gt;
== How to transform your certificate from PEM format into PKCS#12 format ==&lt;br /&gt;
&lt;br /&gt;
This is how you transform your cert into PKCS12 format that can be used within your webbrowser or email send program:&lt;br /&gt;
You first will have to change directory into where you created and keep the certificate, historically this is often in ~/.globus&lt;br /&gt;
	 &lt;br /&gt;
 openssl pkcs12 -export -in usercert.pem -inkey userkey.pem -out cert+key.p12	 &lt;br /&gt;
&lt;br /&gt;
First you will have to enter the password you used for your private key, then you will be asked for a new password to protect the new file. '''cert+key.p12 contains your private key, and is therefore 'lika känslig' as userkey.pem'''. See also [[#Introduction to certificates]]. Security wise the safest way is to delete the PKCS12 file after having imported it into your mail client or browser. Don't forget this.&lt;br /&gt;
&lt;br /&gt;
Remarks: openssl will either need the variable RANDFILE to be set or that ~/.rnd is writable. So you have to make sure that the current $HOME is yours if you have pagshed away, otherwise the command will fail with ''unable to write 'random state''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Signing in mew ===&lt;br /&gt;
&lt;br /&gt;
Mew uses gpgsm. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Import the nordugrid root cert&lt;br /&gt;
&lt;br /&gt;
1.1. get 1f0e8352.0 from nordugrid web&lt;br /&gt;
&lt;br /&gt;
1.2. gpgsm --import 1f0e8352.0&lt;br /&gt;
&lt;br /&gt;
1.2. Make it trusted:&lt;br /&gt;
     gpgsm --list-keys 2&amp;gt;/dev/null | grep fingerprint | awk '{print $2 &amp;quot; S&amp;quot;}' | grep THE-FINGERPRIT-YOU-WANT &amp;gt;&amp;gt; .gnupg/trustlist.txt&lt;br /&gt;
&lt;br /&gt;
2. Add your own key from the cert+key.p12 file in this case&lt;br /&gt;
&lt;br /&gt;
2.1 openssl pkcs12 -in cert+key.p12 -out tmp.pem -nokeys&lt;br /&gt;
&lt;br /&gt;
2.2. gpgsm --import tmp.pem ; rm tmp.pem&lt;br /&gt;
&lt;br /&gt;
2.3. Tell gpgsm not to use revocation lists (bad bad security)&lt;br /&gt;
     echo disable-crl-checks &amp;gt;&amp;gt; .gnupg/gpgsm.conf&lt;br /&gt;
&lt;br /&gt;
3. Test&lt;br /&gt;
   gpgsm --detach-sign file &amp;gt; sign  # should ask for passphrase and give some kind of sign file&lt;br /&gt;
&lt;br /&gt;
4. Use:&lt;br /&gt;
   C-uC-cC-s  then enter your email address (must match email in cert) and passphrase&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Signing in thunderbird ===&lt;br /&gt;
In thunderbird: options/security/digitally sign this message.&lt;br /&gt;
&lt;br /&gt;
If you do this for the first time and haven't defined yet the certificate to sign with, thunderbird will pop up the according preferences [Account settings/Security], where you can choose between your imported certificates in PKCS12 format.&lt;br /&gt;
&lt;br /&gt;
In the beginning, of course, you haven't imported any: Click there on the same preferences tab that popped up on [View Certificates]. In the new window that opens you can import the certificate.&lt;br /&gt;
&lt;br /&gt;
Afterwards you can then choose this certificate to be used for signing and for encryption for this email account.&lt;br /&gt;
&lt;br /&gt;
Don't forget to actually check that you then really sign the corresponding mail.&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=Grid_certificates&amp;diff=5138</id>
		<title>Grid certificates</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=Grid_certificates&amp;diff=5138"/>
		<updated>2013-04-25T14:54:38Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Grid computing]]&lt;br /&gt;
[[Category:SweGrid user guide]]&lt;br /&gt;
[[Category:SweStore]]&lt;br /&gt;
[[Category:SweStore user guide]]&lt;br /&gt;
[[Getting started with SweGrid|&amp;lt; Getting started with SweGrid]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[SweStore|&amp;lt; SweStore]]&lt;br /&gt;
&lt;br /&gt;
=Introduction to certificates=&lt;br /&gt;
&lt;br /&gt;
In order to get access to computer and storage resources on the grid or [[SweStore]] you must have a valid (grid) certificate. This certificate is used instead of a username and password when accessing the resource. The resource have a certificate that tells you that you have contacted the right resource. This is exactly the same mechanism used when you use a web browser to contact your bank.&lt;br /&gt;
&lt;br /&gt;
A certificate is the similar to a passport in real-life. In the same way you have prove your credentials when you acquire a passport the same is true for a certificate. A third party, the Certificate Authority or CA, that both you and the resource trust has to vouch for your identity and sign your certificate.&lt;br /&gt;
&lt;br /&gt;
A certificate consist of a public key, some user information and a signature of the CA. In addition to the certificate you have a private key. The private key is secret and should be kept as secure as possible.&lt;br /&gt;
&lt;br /&gt;
For more information regarding certificates and public key cryptography:&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public-key_cryptography http://en.wikipedia.org/wiki/Public-key_cryptography]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public_key_certificate http://en.wikipedia.org/wiki/Public_key_certificate]&lt;br /&gt;
&lt;br /&gt;
[http://www.nordugrid.org/documents/certificate_howto.html http://www.nordugrid.org/documents/certificate_howto.html]&lt;br /&gt;
&lt;br /&gt;
* The grid certificate and the private key are stored in your web browser and/or located in ~/.globus at the host(s) from where you will be accessing the resource:&lt;br /&gt;
      usercert.pem&lt;br /&gt;
      userkey.pem&lt;br /&gt;
* The certificate contains your public key, your name and organization and a signature by the CA. It is does not contain any username.&lt;br /&gt;
* The certificate is valid for 13 month and should be renewed yearly.&lt;br /&gt;
* The private key should be handled with great care. It should only be readable by you (i.e. ``chmod 400 userkey.pem''). Store the key on trusted computers and transfer the key between computers using encryption (using for example scp).&lt;br /&gt;
* The private key is encrypted using a passphrase. Anyone that can decrypt the private key will be able to authenticate as you to grid resources. This is similar to the private key in SSH. You must choose a strong passphrase for the private key. This passphrase must not be used anywhere else. You must never ever give away the passphrase to somebody else.&lt;br /&gt;
* You should not share the certificate with someone. It's personal. &lt;br /&gt;
&lt;br /&gt;
For more information regarding certificates and public key cryptography:&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public-key_cryptography http://en.wikipedia.org/wiki/Public-key_cryptography]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public_key_certificate http://en.wikipedia.org/wiki/Public_key_certificate]&lt;br /&gt;
&lt;br /&gt;
= Requesting a certificate =&lt;br /&gt;
&lt;br /&gt;
Certificates are issued by a Certificate Authority or CA. For Swedish users there are two relevant CA:s that can issue grid/eScience certificates, Terena and Nordugrid. The Terena CA is preferred if it is available for your university or research group, but many sites has not enabled this service yet. The Nordugrid CA can also be used but requires more manual work by all parties.&lt;br /&gt;
&lt;br /&gt;
Recommended procedure for each university:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
| University&lt;br /&gt;
| CA&lt;br /&gt;
| Specific instructions&lt;br /&gt;
|-&lt;br /&gt;
| LU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[LU_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| LiU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[LiU_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| CTH&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[Chalmers_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| GU&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[GU_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| UU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[UU_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| KTH&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[KTH_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| SU&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[SU_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| KI&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[KI_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| UmU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[UmU_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Requesting a grid certificate using the Terena eScience Portal|Instructions for the Terena CA]]&lt;br /&gt;
&lt;br /&gt;
[[Requesting a grid certificate from the Nordugrid CA|Instructions for the NorduGrid CA (use only if Terena eScience isn't available at your site)]]&lt;br /&gt;
&lt;br /&gt;
= Requesting membership in the SweGrid VO =&lt;br /&gt;
&lt;br /&gt;
SweGrid and SweStore resources are currently being allocated for VO:s, virtual organizations, rather than individual users. A VO is basically just a list of users. To be able to use a SweGrid or SweStore resource a membership in the SweGrid VO (virtual organization) and a corresponding subgroup is required. To apply for membership, make sure that the NorduGrid root CA certificate and your personal certificate is installed in the browser. &lt;br /&gt;
&lt;br /&gt;
The NorduGrid CA cert can be installed by clicking on the following link:&lt;br /&gt;
&lt;br /&gt;
 [http://ca.nordugrid.org/cacrt.crt http://ca.nordugrid.org/cacrt.crt]&lt;br /&gt;
&lt;br /&gt;
Make sure you check the &amp;quot;Trust this CA to identify web sites.&amp;quot; boxes in the dialog shown.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:certinstall.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When certificates have been installed in the browser go to the following URL:&lt;br /&gt;
&lt;br /&gt;
 [https://voms.ndgf.org:8443/voms/swegrid.se https://voms.ndgf.org:8443/voms/swegrid.se]&lt;br /&gt;
&lt;br /&gt;
and follow the instructions. In a couple of hours you will be added to the SweGrid VO. &lt;br /&gt;
&lt;br /&gt;
To be added to the correct SweGrid project send a mail to [mailto:support@swegrid.se support@swegrid.se] and specify your DN as shown in the Terena portal or from the '''arcproxy --info''' command and which SNIC-project to be added to.&lt;br /&gt;
&lt;br /&gt;
To be added to the correct Swestore allocation send a mail to [mailto:swestore-support@snic.vr.se swestore-support@snic.vr.se] and specify your DN as shown in the Terena portal or from the '''arcproxy --info''' command and which Swestore allocation to be added to.&lt;br /&gt;
&lt;br /&gt;
= Proxy certificates =&lt;br /&gt;
&lt;br /&gt;
Authentication on the grid is done using special short lived ''proxy'' certificates. There are several tools available for creating, checking and destroying these proxy certificates.&lt;br /&gt;
 &lt;br /&gt;
== Creating a proxy certificate ==&lt;br /&gt;
&lt;br /&gt;
To create a short lived proxy that can be used for authentication with grid services, the '''arcproxy''' command can be used. A 12 hour (default) proxy is created in the following example:&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy&lt;br /&gt;
 Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Enter pass phrase for /home/kalle/.globus/userkey.pem:&lt;br /&gt;
 .++++++&lt;br /&gt;
 .....++++++&lt;br /&gt;
 Proxy generation succeeded&lt;br /&gt;
 Your proxy is valid until: 2011-03-11 03:00:14&lt;br /&gt;
&lt;br /&gt;
The proxy file itself will be created in the '''/tmp''' directory with the format '''x509up_uid''', where uid is the user id number for your account.&lt;br /&gt;
&lt;br /&gt;
In some cases a longer lived proxy will be needed. This is achieved using the '''--constraint''' switch. A 24-hour can be created by issuing the following command:&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy --constraint=&amp;quot;validityPeriod=24H&amp;quot;&lt;br /&gt;
 Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Enter pass phrase for /home/kalle/.globus/userkey.pem:&lt;br /&gt;
 ....++++++&lt;br /&gt;
 .....++++++&lt;br /&gt;
 Proxy generation succeeded&lt;br /&gt;
 Your proxy is valid until: 2011-03-11 15:03:19&lt;br /&gt;
&lt;br /&gt;
== Checking proxy lifetime ==&lt;br /&gt;
&lt;br /&gt;
The remaining lifetime of a proxy certificate can be checked using the '''arcproxy''' command with the '''--info''' switch.&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy --info&lt;br /&gt;
 Subject: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula/CN=1567862803&lt;br /&gt;
 Identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Time left for proxy: 11 hours 55 minutes&lt;br /&gt;
 Proxy path: /tmp/x509up_u500&lt;br /&gt;
 Proxy type: X.509 Proxy Certificate Profile RFC compliant restricted proxy&lt;br /&gt;
&lt;br /&gt;
In this example the proxy certificate is valid for 11 hours 55 minutes more.&lt;br /&gt;
&lt;br /&gt;
== Destroying a proxy certificate ==&lt;br /&gt;
&lt;br /&gt;
A proxy can be destroyed with the '''-r''' or '''--remove''' switch.&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy -r&lt;br /&gt;
&lt;br /&gt;
or&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy --remove&lt;br /&gt;
&lt;br /&gt;
= VOMS certificates =&lt;br /&gt;
&lt;br /&gt;
As long as you are a member of only one VO or VO group, you can&lt;br /&gt;
authenticate to a grid service with the regular grid proxy certificate&lt;br /&gt;
as defined in the previous section. If you are a member of more than&lt;br /&gt;
one VO or VO group you may want to select which membership you want to&lt;br /&gt;
be authenticated as. For example, if you are a member of&lt;br /&gt;
''swegrid.se:/swegrid.se/ops'' (operations staff) and&lt;br /&gt;
''swegrid.se:/swegrid.se/bils'' and want to write a file, who should&lt;br /&gt;
be the owner? Ops or bils? You need to provide some additional&lt;br /&gt;
information. In the grid world this is done with a voms proxy&lt;br /&gt;
certificate which basically is a regular proxy certificate but with a&lt;br /&gt;
so called voms extension that contains a list of your VO group&lt;br /&gt;
memberships (and roles and attributes, which we don't use in&lt;br /&gt;
Swegrid/Swestore at the moment).&lt;br /&gt;
&lt;br /&gt;
'''Please note, if you only have one membership you can skip this section!'''&lt;br /&gt;
&lt;br /&gt;
The voms extension of the certificate is signed by the virtual&lt;br /&gt;
organization management server, or VOMS server. The same VOMS server&lt;br /&gt;
you used when applying for the swegrid.se VO membership in the first&lt;br /&gt;
place. To enable this signing process you need to add a few&lt;br /&gt;
configuration files to your system. First add this to the file&lt;br /&gt;
'''/etc/vomses''':&lt;br /&gt;
&lt;br /&gt;
   &amp;quot;swegrid.se&amp;quot; &amp;quot;voms.ndgf.org&amp;quot; &amp;quot;15009&amp;quot; &amp;quot;/O=Grid/O=NorduGrid/CN=host/voms.ndgf.org&amp;quot; &amp;quot;swegrid.se&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Next create the necessary directories and the file&lt;br /&gt;
'''/etc/grid-security/vomsdir/swegrid.se/voms.ndgf.org.lsc''' with the&lt;br /&gt;
following contents:&lt;br /&gt;
&lt;br /&gt;
   /O=Grid/O=NorduGrid/CN=host/voms.ndgf.org&lt;br /&gt;
   /O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority&lt;br /&gt;
&lt;br /&gt;
== Creating a VOMS proxy ==&lt;br /&gt;
&lt;br /&gt;
VOMS proxies in ARC1 can be created using the '''arcproxy''' command&lt;br /&gt;
and the '''-S''' or '''--voms''' switches as shown in the following&lt;br /&gt;
example (if you are a member of the /swegrid.se/ops group. Adjust as&lt;br /&gt;
necessary):&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy -S swegrid.se:/swegrid.se/ops&lt;br /&gt;
 Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Enter pass phrase for /home/kalle/.globus/userkey.pem:&lt;br /&gt;
 .....++++++&lt;br /&gt;
 ............++++++&lt;br /&gt;
 Contacting VOMS server (named swegrid.se): voms.ndgf.org on port: 15009&lt;br /&gt;
 Proxy generation succeeded&lt;br /&gt;
 Your proxy is valid until: 2011-03-10 23:33:06&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Signing your e-mail with your certificate =&lt;br /&gt;
&lt;br /&gt;
First, you will need your grid certificate in PKCS12 format:&lt;br /&gt;
== How to transform your certificate from PEM format into PKCS#12 format ==&lt;br /&gt;
&lt;br /&gt;
This is how you transform your cert into PKCS12 format that can be used within your webbrowser or email send program:&lt;br /&gt;
You first will have to change directory into where you created and keep the certificate, historically this is often in ~/.globus&lt;br /&gt;
	 &lt;br /&gt;
 openssl pkcs12 -export -in usercert.pem -inkey userkey.pem -out cert+key.p12	 &lt;br /&gt;
&lt;br /&gt;
First you will have to enter the password you used for your private key, then you will be asked for a new password to protect the new file. '''cert+key.p12&lt;br /&gt;
contains your private key, and is therefore 'lika känslig' as userkey.pem'''. See also [[#Introduction to certificates]]. Security wise the safest way is to delete the PKCS12 file after having imported it into your mail client or browser. Don't forget this.&lt;br /&gt;
&lt;br /&gt;
Remarks: openssl will either need the variable RANDFILE to be set or that ~/.rnd is writable. So you have to make sure that the current $HOME is yours if you have pagshed away, otherwise the command will fail with ''unable to write 'random state''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== ... in mew ===&lt;br /&gt;
&lt;br /&gt;
Mew uses gpgsm. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Import the nordugrid root cert&lt;br /&gt;
&lt;br /&gt;
1.1. get 1f0e8352.0 from nordugrid web&lt;br /&gt;
&lt;br /&gt;
1.2. gpgsm --import 1f0e8352.0&lt;br /&gt;
&lt;br /&gt;
1.2. Make it trusted:&lt;br /&gt;
     gpgsm --list-keys 2&amp;gt;/dev/null | grep fingerprint | awk '{print $2 &amp;quot; S&amp;quot;}' | grep THE-FINGERPRIT-YOU-WANT &amp;gt;&amp;gt; .gnupg/trustlist.txt&lt;br /&gt;
&lt;br /&gt;
2. Add your own key from the cert+key.p12 file in this case&lt;br /&gt;
&lt;br /&gt;
2.1 openssl pkcs12 -in cert+key.p12 -out tmp.pem -nokeys&lt;br /&gt;
&lt;br /&gt;
2.2. gpgsm --import tmp.pem ; rm tmp.pem&lt;br /&gt;
&lt;br /&gt;
2.3. Tell gpgsm not to use revocation lists (bad bad security)&lt;br /&gt;
     echo disable-crl-checks &amp;gt;&amp;gt; .gnupg/gpgsm.conf&lt;br /&gt;
&lt;br /&gt;
3. Test&lt;br /&gt;
   gpgsm --detach-sign file &amp;gt; sign  # should ask for passphrase and give some kind of sign file&lt;br /&gt;
&lt;br /&gt;
4. Use:&lt;br /&gt;
   C-uC-cC-s  then enter your email address (must match email in cert) and passphrase&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== .. in thunderbird ===&lt;br /&gt;
In thunderbird: options/security/digitally sign this message.&lt;br /&gt;
&lt;br /&gt;
If you do this for the first time and haven't defined yet the certificate to sign with, thunderbird will pop up the according preferences [Account settings/Security], where you can choose between your imported certificates in PKCS12 format.&lt;br /&gt;
&lt;br /&gt;
In the beginning, of course, you haven't imported any: Click there on the same preferences tab that popped up on [View Certificates]. In the new window that opens you can import the certificate.&lt;br /&gt;
&lt;br /&gt;
Afterwards you can then choose this certificate to be used for signing and for encryption for this email account.&lt;br /&gt;
&lt;br /&gt;
Don't forget to actually check that you then really sign the corresponding mail.&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=Grid_certificates&amp;diff=5137</id>
		<title>Grid certificates</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=Grid_certificates&amp;diff=5137"/>
		<updated>2013-04-25T14:49:20Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Grid computing]]&lt;br /&gt;
[[Category:SweGrid user guide]]&lt;br /&gt;
[[Category:SweStore]]&lt;br /&gt;
[[Category:SweStore user guide]]&lt;br /&gt;
[[Getting started with SweGrid|&amp;lt; Getting started with SweGrid]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[SweStore|&amp;lt; SweStore]]&lt;br /&gt;
&lt;br /&gt;
=Introduction to certificates=&lt;br /&gt;
&lt;br /&gt;
In order to get access to computer and storage resources on the grid or [[SweStore]] you must have a valid (grid) certificate. This certificate is used instead of a username and password when accessing the resource. The resource have a certificate that tells you that you have contacted the right resource. This is exactly the same mechanism used when you use a web browser to contact your bank.&lt;br /&gt;
&lt;br /&gt;
A certificate is the similar to a passport in real-life. In the same way you have prove your credentials when you acquire a passport the same is true for a certificate. A third party, the Certificate Authority or CA, that both you and the resource trust has to vouch for your identity and sign your certificate.&lt;br /&gt;
&lt;br /&gt;
A certificate consist of a public key, some user information and a signature of the CA. In addition to the certificate you have a private key. The private key is secret and should be kept as secure as possible.&lt;br /&gt;
&lt;br /&gt;
For more information regarding certificates and public key cryptography:&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public-key_cryptography http://en.wikipedia.org/wiki/Public-key_cryptography]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public_key_certificate http://en.wikipedia.org/wiki/Public_key_certificate]&lt;br /&gt;
&lt;br /&gt;
[http://www.nordugrid.org/documents/certificate_howto.html http://www.nordugrid.org/documents/certificate_howto.html]&lt;br /&gt;
&lt;br /&gt;
* The grid certificate and the private key are stored in your web browser and/or located in ~/.globus at the host(s) from where you will be accessing the resource:&lt;br /&gt;
      usercert.pem&lt;br /&gt;
      userkey.pem&lt;br /&gt;
* The certificate contains your public key, your name and organization and a signature by the CA. It is does not contain any username.&lt;br /&gt;
* The certificate is valid for 13 month and should be renewed yearly.&lt;br /&gt;
* The private key should be handled with great care. It should only be readable by you (i.e. ``chmod 400 userkey.pem''). Store the key on trusted computers and transfer the key between computers using encryption (using for example scp).&lt;br /&gt;
* The private key is encrypted using a passphrase. Anyone that can decrypt the private key will be able to authenticate as you to grid resources. This is similar to the private key in SSH. You must choose a strong passphrase for the private key. This passphrase must not be used anywhere else. You must never ever give away the passphrase to somebody else.&lt;br /&gt;
* You should not share the certificate with someone. It's personal. &lt;br /&gt;
&lt;br /&gt;
For more information regarding certificates and public key cryptography:&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public-key_cryptography http://en.wikipedia.org/wiki/Public-key_cryptography]&lt;br /&gt;
[http://en.wikipedia.org/wiki/Public_key_certificate http://en.wikipedia.org/wiki/Public_key_certificate]&lt;br /&gt;
&lt;br /&gt;
= Requesting a certificate =&lt;br /&gt;
&lt;br /&gt;
Certificates are issued by a Certificate Authority or CA. For Swedish users there are two relevant CA:s that can issue grid/eScience certificates, Terena and Nordugrid. The Terena CA is preferred if it is available for your university or research group, but many sites has not enabled this service yet. The Nordugrid CA can also be used but requires more manual work by all parties.&lt;br /&gt;
&lt;br /&gt;
Recommended procedure for each university:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
| University&lt;br /&gt;
| CA&lt;br /&gt;
| Specific instructions&lt;br /&gt;
|-&lt;br /&gt;
| LU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[LU_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| LiU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[LiU_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| CTH&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[Chalmers_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| GU&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[GU_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| UU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[UU_Certificate_Instructions|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| KTH&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[KTH_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| SU&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[SU_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| KI&lt;br /&gt;
| NorduGrid CA&lt;br /&gt;
| [[KI_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
| UmU&lt;br /&gt;
| Terena CA&lt;br /&gt;
| [[UmU_Certificate_Information|more...]]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Requesting a grid certificate using the Terena eScience Portal|Instructions for the Terena CA]]&lt;br /&gt;
&lt;br /&gt;
[[Requesting a grid certificate from the Nordugrid CA|Instructions for the NorduGrid CA (use only if Terena eScience isn't available at your site)]]&lt;br /&gt;
&lt;br /&gt;
= Requesting membership in the SweGrid VO =&lt;br /&gt;
&lt;br /&gt;
SweGrid and SweStore resources are currently being allocated for VO:s, virtual organizations, rather than individual users. A VO is basically just a list of users. To be able to use a SweGrid or SweStore resource a membership in the SweGrid VO (virtual organization) and a corresponding subgroup is required. To apply for membership, make sure that the NorduGrid root CA certificate and your personal certificate is installed in the browser. &lt;br /&gt;
&lt;br /&gt;
The NorduGrid CA cert can be installed by clicking on the following link:&lt;br /&gt;
&lt;br /&gt;
 [http://ca.nordugrid.org/cacrt.crt http://ca.nordugrid.org/cacrt.crt]&lt;br /&gt;
&lt;br /&gt;
Make sure you check the &amp;quot;Trust this CA to identify web sites.&amp;quot; boxes in the dialog shown.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:certinstall.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When certificates have been installed in the browser go to the following URL:&lt;br /&gt;
&lt;br /&gt;
 [https://voms.ndgf.org:8443/voms/swegrid.se https://voms.ndgf.org:8443/voms/swegrid.se]&lt;br /&gt;
&lt;br /&gt;
and follow the instructions. In a couple of hours you will be added to the SweGrid VO. &lt;br /&gt;
&lt;br /&gt;
To be added to the correct SweGrid project send a mail to [mailto:support@swegrid.se support@swegrid.se] and specify your DN as shown in the Terena portal or from the '''arcproxy --info''' command and which SNIC-project to be added to.&lt;br /&gt;
&lt;br /&gt;
To be added to the correct Swestore allocation send a mail to [mailto:swestore-support@snic.vr.se swestore-support@snic.vr.se] and specify your DN as shown in the Terena portal or from the '''arcproxy --info''' command and which Swestore allocation to be added to.&lt;br /&gt;
&lt;br /&gt;
= Proxy certificates =&lt;br /&gt;
&lt;br /&gt;
Authentication on the grid is done using special short lived ''proxy'' certificates. There are several tools available for creating, checking and destroying these proxy certificates.&lt;br /&gt;
 &lt;br /&gt;
== Creating a proxy certificate ==&lt;br /&gt;
&lt;br /&gt;
To create a short lived proxy that can be used for authentication with grid services, the '''arcproxy''' command can be used. A 12 hour (default) proxy is created in the following example:&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy&lt;br /&gt;
 Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Enter pass phrase for /home/kalle/.globus/userkey.pem:&lt;br /&gt;
 .++++++&lt;br /&gt;
 .....++++++&lt;br /&gt;
 Proxy generation succeeded&lt;br /&gt;
 Your proxy is valid until: 2011-03-11 03:00:14&lt;br /&gt;
&lt;br /&gt;
The proxy file itself will be created in the '''/tmp''' directory with the format '''x509up_uid''', where uid is the user id number for your account.&lt;br /&gt;
&lt;br /&gt;
In some cases a longer lived proxy will be needed. This is achieved using the '''--constraint''' switch. A 24-hour can be created by issuing the following command:&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy --constraint=&amp;quot;validityPeriod=24H&amp;quot;&lt;br /&gt;
 Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Enter pass phrase for /home/kalle/.globus/userkey.pem:&lt;br /&gt;
 ....++++++&lt;br /&gt;
 .....++++++&lt;br /&gt;
 Proxy generation succeeded&lt;br /&gt;
 Your proxy is valid until: 2011-03-11 15:03:19&lt;br /&gt;
&lt;br /&gt;
== Checking proxy lifetime ==&lt;br /&gt;
&lt;br /&gt;
The remaining lifetime of a proxy certificate can be checked using the '''arcproxy''' command with the '''--info''' switch.&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy --info&lt;br /&gt;
 Subject: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula/CN=1567862803&lt;br /&gt;
 Identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Time left for proxy: 11 hours 55 minutes&lt;br /&gt;
 Proxy path: /tmp/x509up_u500&lt;br /&gt;
 Proxy type: X.509 Proxy Certificate Profile RFC compliant restricted proxy&lt;br /&gt;
&lt;br /&gt;
In this example the proxy certificate is valid for 11 hours 55 minutes more.&lt;br /&gt;
&lt;br /&gt;
== Destroying a proxy certificate ==&lt;br /&gt;
&lt;br /&gt;
A proxy can be destroyed with the '''-r''' or '''--remove''' switch.&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy -r&lt;br /&gt;
&lt;br /&gt;
or&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy --remove&lt;br /&gt;
&lt;br /&gt;
= VOMS certificates =&lt;br /&gt;
&lt;br /&gt;
As long as you are a member of only one VO or VO group, you can&lt;br /&gt;
authenticate to a grid service with the regular grid proxy certificate&lt;br /&gt;
as defined in the previous section. If you are a member of more than&lt;br /&gt;
one VO or VO group you may want to select which membership you want to&lt;br /&gt;
be authenticated as. For example, if you are a member of&lt;br /&gt;
''swegrid.se:/swegrid.se/ops'' (operations staff) and&lt;br /&gt;
''swegrid.se:/swegrid.se/bils'' and want to write a file, who should&lt;br /&gt;
be the owner? Ops or bils? You need to provide some additional&lt;br /&gt;
information. In the grid world this is done with a voms proxy&lt;br /&gt;
certificate which basically is a regular proxy certificate but with a&lt;br /&gt;
so called voms extension that contains a list of your VO group&lt;br /&gt;
memberships (and roles and attributes, which we don't use in&lt;br /&gt;
Swegrid/Swestore at the moment).&lt;br /&gt;
&lt;br /&gt;
'''Please note, if you only have one membership you can skip this section!'''&lt;br /&gt;
&lt;br /&gt;
The voms extension of the certificate is signed by the virtual&lt;br /&gt;
organization management server, or VOMS server. The same VOMS server&lt;br /&gt;
you used when applying for the swegrid.se VO membership in the first&lt;br /&gt;
place. To enable this signing process you need to add a few&lt;br /&gt;
configuration files to your system. First add this to the file&lt;br /&gt;
'''/etc/vomses''':&lt;br /&gt;
&lt;br /&gt;
   &amp;quot;swegrid.se&amp;quot; &amp;quot;voms.ndgf.org&amp;quot; &amp;quot;15009&amp;quot; &amp;quot;/O=Grid/O=NorduGrid/CN=host/voms.ndgf.org&amp;quot; &amp;quot;swegrid.se&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Next create the necessary directories and the file&lt;br /&gt;
'''/etc/grid-security/vomsdir/swegrid.se/voms.ndgf.org.lsc''' with the&lt;br /&gt;
following contents:&lt;br /&gt;
&lt;br /&gt;
   /O=Grid/O=NorduGrid/CN=host/voms.ndgf.org&lt;br /&gt;
   /O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority&lt;br /&gt;
&lt;br /&gt;
== Creating a VOMS proxy ==&lt;br /&gt;
&lt;br /&gt;
VOMS proxies in ARC1 can be created using the '''arcproxy''' command&lt;br /&gt;
and the '''-S''' or '''--voms''' switches as shown in the following&lt;br /&gt;
example (if you are a member of the /swegrid.se/ops group. Adjust as&lt;br /&gt;
necessary):&lt;br /&gt;
&lt;br /&gt;
 $ arcproxy -S swegrid.se:/swegrid.se/ops&lt;br /&gt;
 Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Kalle Kula&lt;br /&gt;
 Enter pass phrase for /home/kalle/.globus/userkey.pem:&lt;br /&gt;
 .....++++++&lt;br /&gt;
 ............++++++&lt;br /&gt;
 Contacting VOMS server (named swegrid.se): voms.ndgf.org on port: 15009&lt;br /&gt;
 Proxy generation succeeded&lt;br /&gt;
 Your proxy is valid until: 2011-03-10 23:33:06&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Signing your e-mail with your certificate =&lt;br /&gt;
&lt;br /&gt;
First, you will need your grid certificate in PKCS12 format:&lt;br /&gt;
== How to transform your certificate from PEM format into PKCS#12 format ==&lt;br /&gt;
&lt;br /&gt;
This is how you transform your cert into PKCS12 format that can be used within your webbrowser or email send program:&lt;br /&gt;
You first will have to change directory into where you created and keep the certificate, historically this is often in ~/.globus&lt;br /&gt;
	 &lt;br /&gt;
 openssl pkcs12 -export -in usercert.pem -inkey userkey.pem -out cert+key.p12	 &lt;br /&gt;
&lt;br /&gt;
First you will have to enter the password you used for your private key, then you will be asked for a new password to protect the new file. '''cert+key.p12&lt;br /&gt;
contains your private key, and is therefore 'lika känslig' as userkey.pem'''. See also [[#Secure_handling_of_certificates]].&lt;br /&gt;
&lt;br /&gt;
Remarks: openssl will either need the variable RANDFILE to be set or that ~/.rnd is writable. So you have to make sure that the current $HOME is yours if you have pagshed away, otherwise the command will fail with ''unable to write 'random state''.&lt;br /&gt;
&lt;br /&gt;
=== ... in mew ===&lt;br /&gt;
&lt;br /&gt;
Mew uses gpgsm. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Import the nordugrid root cert&lt;br /&gt;
&lt;br /&gt;
1.1. get 1f0e8352.0 from nordugrid web&lt;br /&gt;
&lt;br /&gt;
1.2. gpgsm --import 1f0e8352.0&lt;br /&gt;
&lt;br /&gt;
1.2. Make it trusted:&lt;br /&gt;
     gpgsm --list-keys 2&amp;gt;/dev/null | grep fingerprint | awk '{print $2 &amp;quot; S&amp;quot;}' | grep THE-FINGERPRIT-YOU-WANT &amp;gt;&amp;gt; .gnupg/trustlist.txt&lt;br /&gt;
&lt;br /&gt;
2. Add your own key from the cert+key.p12 file in this case&lt;br /&gt;
&lt;br /&gt;
2.1 openssl pkcs12 -in cert+key.p12 -out tmp.pem -nokeys&lt;br /&gt;
&lt;br /&gt;
2.2. gpgsm --import tmp.pem ; rm tmp.pem&lt;br /&gt;
&lt;br /&gt;
2.3. Tell gpgsm not to use revocation lists (bad bad security)&lt;br /&gt;
     echo disable-crl-checks &amp;gt;&amp;gt; .gnupg/gpgsm.conf&lt;br /&gt;
&lt;br /&gt;
3. Test&lt;br /&gt;
   gpgsm --detach-sign file &amp;gt; sign  # should ask for passphrase and give some kind of sign file&lt;br /&gt;
&lt;br /&gt;
4. Use:&lt;br /&gt;
   C-uC-cC-s  then enter your email address (must match email in cert) and passphrase&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== .. in thunderbird ===&lt;br /&gt;
In thunderbird: options/security/digitally sign this message.&lt;br /&gt;
&lt;br /&gt;
If you do this for the first time and haven't defined yet the certificate to sign with, thunderbird will pop up the according preferences [Account settings/Security], where you can choose between your imported certificates in PKCS12 format.&lt;br /&gt;
&lt;br /&gt;
In the beginning, of course, you haven't imported any: Click there on the same preferences tab that popped up on [View Certificates]. In the new window that opens you can import the certificate.&lt;br /&gt;
&lt;br /&gt;
Afterwards you can then choose this certificate to be used for signing and for encryption for this email account.&lt;br /&gt;
&lt;br /&gt;
Don't forget to actually check that you then really sign the corresponding mail.&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=Requesting_a_grid_certificate_from_the_Nordugrid_CA&amp;diff=5136</id>
		<title>Requesting a grid certificate from the Nordugrid CA</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=Requesting_a_grid_certificate_from_the_Nordugrid_CA&amp;diff=5136"/>
		<updated>2013-04-25T14:41:11Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): /* Renewing a NorduGrid user certificate = */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Grid computing]]&lt;br /&gt;
[[Category:SweGrid user guide]]&lt;br /&gt;
[[Category:SweStore]]&lt;br /&gt;
[[Category:SweStore user guide]]&lt;br /&gt;
[[Grid_certificates|&amp;lt; Grid certificates]]&lt;br /&gt;
&lt;br /&gt;
The first step in acquiring a certificate from the nordugrid CA is to create a certificate request.&lt;br /&gt;
&lt;br /&gt;
== Creating a certificate request using the ARC tools ==&lt;br /&gt;
&lt;br /&gt;
This is done using the '''grid-cert-request -int''' command. (The -int options means interactive usage). When issued, the tool will generate a certificate request and a private key. The tool will also ask for a password to protect the private key. Note, if the password is lost a new certificate must be obtained. The process is shown below:&lt;br /&gt;
&lt;br /&gt;
First the private key is generated:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;$ grid-cert-request -int&lt;br /&gt;
A certificate request and private key is being created.&lt;br /&gt;
You will be asked to enter a PEM pass phrase.&lt;br /&gt;
This pass phrase is akin to your account password,&lt;br /&gt;
and is used to protect your key file.&lt;br /&gt;
If you forget your pass phrase, you will need to&lt;br /&gt;
obtain a new certificate.&lt;br /&gt;
&lt;br /&gt;
Using configuration from /etc/grid-security/globus-user-ssl.conf&lt;br /&gt;
Generating a 1024 bit RSA private key&lt;br /&gt;
.....................................++++++&lt;br /&gt;
....................++++++&lt;br /&gt;
writing new private key to '/home/jonas/.globus/userkey.pem'&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To protect the private key from unauthorized access it is encrypted using a pass phrase. If this pass phrase is empty, anyone with access to your private key and certificate can gain access to the resources you have been granted. The pass phrase should also be different from your normal login password, so if your local system has been compromised the private key is still protected.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;-----&lt;br /&gt;
You are about to be asked to enter information that will be&lt;br /&gt;
incorporated into your certificate request. What you are about to&lt;br /&gt;
enter is what is called a Distinguished Name or a DN. There are&lt;br /&gt;
quite a few fields but you can leave some blank For some fields&lt;br /&gt;
there will be a default value, If you enter '.', the field will be&lt;br /&gt;
left blank.&lt;br /&gt;
-----&lt;br /&gt;
Level 0 Organization Name (do not modify) [Grid]:&lt;br /&gt;
Level 1 Organization Name (do not modify) [NorduGrid]:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The following questions regards your affiliation domain and your email. It is important that your domain and the domain in the email address is the same.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;Your Domain [example.org]:mydomain.org&lt;br /&gt;
Name (e.g., Hans Christian Andersen) []:Joe User&lt;br /&gt;
Email address (e.g., h.c.andersen@example.org) []:joe.user@&lt;br /&gt;
mydomain.org&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Finally the private key and a certificate request are generated.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;A private key and a certificate request has been generated with&lt;br /&gt;
the subject:&lt;br /&gt;
&lt;br /&gt;
/O=Grid/O=NorduGrid/OU=mydomain.org/CN=Joe User/Email=joe.user@&lt;br /&gt;
mydomain.org&lt;br /&gt;
&lt;br /&gt;
If the CN=Joe User/Email=joe.user@mydomain.org is not appropriate,&lt;br /&gt;
rerun this script with the -force -cn &amp;amp;quot;Common Name&amp;amp;quot; options.&lt;br /&gt;
&lt;br /&gt;
Your private key is stored in /home/joe/.globus/userkey.pem&lt;br /&gt;
Your request is stored in /home/joe/.globus/usercert_request.pem&lt;br /&gt;
&lt;br /&gt;
Please e-mail the request to the NorduGrid Certification Authority&lt;br /&gt;
ca@nbi.dk You may use a command similar to the following:&lt;br /&gt;
&lt;br /&gt;
  cat /home/jonas/.globus/usercert_request.pem | mail ca@nbi.dk&lt;br /&gt;
&lt;br /&gt;
Only use the above if this machine can send AND receive e-mail. if&lt;br /&gt;
not, please mail using some other method.&lt;br /&gt;
&lt;br /&gt;
Your certificate will be mailed to you within two working days. If&lt;br /&gt;
you receive no response, contact NorduGrid Certification Authority&lt;br /&gt;
at ca@nbi.dk&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Creating a certificate request using openssl ==&lt;br /&gt;
&lt;br /&gt;
If grid-proxy-init isn't available you can use ''openssl'' to create a certificate request and a private key. Openssl will ask for a password to protect the private key. Note, if the password or private key is lost, a new certificate must be obtained. The process is shown below:&lt;br /&gt;
&lt;br /&gt;
 $ mkdir -p ~/.globus&lt;br /&gt;
 $ openssl req -new -newkey rsa:2048 \&lt;br /&gt;
   -out ~/.globus/usercert_request.pem \&lt;br /&gt;
   -keyout ~/.globus/userkey.pem \&lt;br /&gt;
   -subj &amp;quot;/O=Grid/O=NorduGrid/OU=nsc.liu.se/CN=Kalle Kula/emailAddress=kalle@nsc.liu.se&amp;quot;&lt;br /&gt;
 Generating a 2048 bit RSA private key&lt;br /&gt;
 .........+++&lt;br /&gt;
 .....................+++&lt;br /&gt;
 writing new private key to '~/.globus/userkey.pem'&lt;br /&gt;
 Enter PEM pass phrase:&lt;br /&gt;
 Verifying - Enter PEM pass phrase:&lt;br /&gt;
 -----&lt;br /&gt;
&lt;br /&gt;
Modify OU, CN and emailAddress as necessary. It is probably important that your OU and the domain in the email address are the same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sending the certificate request to the Nordugrid CA ==&lt;br /&gt;
&lt;br /&gt;
When the certificate request is created there will be 2 files, '''userkey.pem''' and '''usercert_request.pem''', in a subdirectory called '''.globus''' in your home directory. The '''userkey.pem''' is your private key and should not be world readable. This can be achieved by using '''chmod 400 ~/.globus/userkey.pem'''.&lt;br /&gt;
&lt;br /&gt;
The contents of the '''usercert_request.pem''' should be sent by mail to you neareast Registration Authority (RA). The RA will verify your request and verify your identity. This can involve meeting with the RA and proving your identity with a passport or equivalent documents. The current list of RA:s can be found at the following page:&lt;br /&gt;
&lt;br /&gt;
[http://ca.nordugrid.org/ra.html http://ca.nordugrid.org/ra.html]&lt;br /&gt;
&lt;br /&gt;
== Installing the certificate in your home directory ==&lt;br /&gt;
&lt;br /&gt;
When certificate request is signed by the CA you will receive a mail with the certificate.&lt;br /&gt;
&lt;br /&gt;
The important parts of the mail are shown below::&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;-----BEGIN CERTIFICATE-----&lt;br /&gt;
MIIDKDCCApGgAwIBAgICFAgwDQYJKoZIhvcNAQEFBQAwTzENMAsGA1UEChMER3Jp&lt;br /&gt;
ZDESMBAGA1UEChMJTm9yZHVHcmlkMSowKAYDVQQDEyFOb3JkdUdyaWQgQ2VydGlm&lt;br /&gt;
...&lt;br /&gt;
-----END CERTIFICATE-----&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Copy the part shown above into the file '''usercert.pem''' in the '''.globus''' directory in your home directory.&lt;br /&gt;
&lt;br /&gt;
== Installing the certificate in your browser ==&lt;br /&gt;
&lt;br /&gt;
To use the requested certificate in your browser it has to be converted to pkcs12 format. This can be done using the following commands (on a linux/unix based system):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ cd ~/.globus&lt;br /&gt;
$ openssl pkcs12 -export -in usercert.pem -inkey userkey.pem -out DELETE_ME.p12&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
First openssl ask for your passphrase for your private key.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Enter pass phrase for userkey.pem:&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the pkcs12 file will consist of both your public and private key, the generated file is protected by an additional passphrase which openssl asks for:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Enter Export Password:&lt;br /&gt;
Verifying - Enter Export Password:&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The generated file, DELETE_ME.p12, can then be imported into your web browser. &lt;br /&gt;
&lt;br /&gt;
To import the certificate in Firefox, open the &amp;quot;Advanced&amp;quot; tab in the Preferences dialog, and select the &amp;quot;Encryption&amp;quot; tab. Click the &amp;quot;Certificates&amp;quot; button and then the &amp;quot;Import...&amp;quot; button. Select your generated DELETE_ME.p12 file, and Firefox will then ask you for the export passphrase to entered in the openssl command.  In Chrome, the procedure is pretty much the same, except you have to go to &amp;quot;Settings&amp;quot; and click &amp;quot;Under the Hood&amp;quot; in the sidebar and then the &amp;quot;Manage certificates...&amp;quot; button to find the &amp;quot;Import...&amp;quot; button. &lt;br /&gt;
&lt;br /&gt;
On Mac OSX most browsers (except Firefox) use the keychain to store certificates, and you can import DELETE_ME.p12 to the keychain by double clicking it in the finder.&lt;br /&gt;
&lt;br /&gt;
Do not forget to delete DELETE_ME.p12 when you are done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Renewing a NorduGrid user certificate ==&lt;br /&gt;
&lt;br /&gt;
Go into your .globus directory. There you can make a new directory and jump into it to create your new certificates, while still be able to to use the old ones as long as they are valid.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mkdir new`date +%y%m%d`&lt;br /&gt;
cd new`date +%y%m%d`&lt;br /&gt;
openssl req -newkey rsa:2048 -keyout newuserkey.pem -subj &amp;quot;/O=Grid/O=NorduGrid/OU=pdc.kth.se/CN=Firstname Lastname/emailAddress=your-email@pdc.kth.se&amp;quot; -new -out usercert_request.pem&lt;br /&gt;
chmod 400 newuserkey.pem&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note: Firstname Lastname do not need to be uppercase. If you change case/spelling/email-address in your certificate when renewing a certificate, then RT-systems, web-servers, wiki et cetera will likely not recognize you, as it is often done through plain character string matching! So check what your had in your old cert in beforehand.&lt;br /&gt;
&lt;br /&gt;
''Update'': For user certificates it is no longer necessary to create a signaturefile, but this is how you would have done it:&lt;br /&gt;
 openssl dgst -binary -sign ../userkey.pem &amp;lt; usercert_request.pem &amp;gt; req.sig&lt;br /&gt;
&lt;br /&gt;
=== Mailing your renewal request ===&lt;br /&gt;
You will have to send an email with the *_request.pem file inline and the eventual sigfile attached. &lt;br /&gt;
For human readability and faster responsetime it can be recommended to also paste the output of&lt;br /&gt;
 openssl req -in usercert_request.pem -noout -text&lt;br /&gt;
into the body of the email. Another appreciated information is the time when your current certificate will expire.&lt;br /&gt;
The recipient of your email is generally your RA (the one you used when asking for your previous cert, see above) who will control, sign and forward it for you to ca@nordugrid.org.&lt;br /&gt;
&lt;br /&gt;
If you are able to [[Grid_certificates#Signing_your_e-mail_with_your_certificate| sign the mail]] '''(signing doesn't mean attaching!!!)''' with the still valid old certificate in PKCS12 format you can send it directly to the CA at ca@nordugrid.org &lt;br /&gt;
In that case you don't need to give the information of when your current certificate will expire since it is obvious. It is still recommended though that you CC your RA who can then inform you of any expected delays and could point out if your signature doesn't look valid.&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
	<entry>
		<id>http://docs.snic.se/w/index.php?title=Requesting_a_grid_certificate_from_the_Nordugrid_CA&amp;diff=5135</id>
		<title>Requesting a grid certificate from the Nordugrid CA</title>
		<link rel="alternate" type="text/html" href="http://docs.snic.se/w/index.php?title=Requesting_a_grid_certificate_from_the_Nordugrid_CA&amp;diff=5135"/>
		<updated>2013-04-25T14:40:50Z</updated>

		<summary type="html">&lt;p&gt;Michaela Barth (PDC): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Grid computing]]&lt;br /&gt;
[[Category:SweGrid user guide]]&lt;br /&gt;
[[Category:SweStore]]&lt;br /&gt;
[[Category:SweStore user guide]]&lt;br /&gt;
[[Grid_certificates|&amp;lt; Grid certificates]]&lt;br /&gt;
&lt;br /&gt;
The first step in acquiring a certificate from the nordugrid CA is to create a certificate request.&lt;br /&gt;
&lt;br /&gt;
== Creating a certificate request using the ARC tools ==&lt;br /&gt;
&lt;br /&gt;
This is done using the '''grid-cert-request -int''' command. (The -int options means interactive usage). When issued, the tool will generate a certificate request and a private key. The tool will also ask for a password to protect the private key. Note, if the password is lost a new certificate must be obtained. The process is shown below:&lt;br /&gt;
&lt;br /&gt;
First the private key is generated:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;$ grid-cert-request -int&lt;br /&gt;
A certificate request and private key is being created.&lt;br /&gt;
You will be asked to enter a PEM pass phrase.&lt;br /&gt;
This pass phrase is akin to your account password,&lt;br /&gt;
and is used to protect your key file.&lt;br /&gt;
If you forget your pass phrase, you will need to&lt;br /&gt;
obtain a new certificate.&lt;br /&gt;
&lt;br /&gt;
Using configuration from /etc/grid-security/globus-user-ssl.conf&lt;br /&gt;
Generating a 1024 bit RSA private key&lt;br /&gt;
.....................................++++++&lt;br /&gt;
....................++++++&lt;br /&gt;
writing new private key to '/home/jonas/.globus/userkey.pem'&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To protect the private key from unauthorized access it is encrypted using a pass phrase. If this pass phrase is empty, anyone with access to your private key and certificate can gain access to the resources you have been granted. The pass phrase should also be different from your normal login password, so if your local system has been compromised the private key is still protected.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;-----&lt;br /&gt;
You are about to be asked to enter information that will be&lt;br /&gt;
incorporated into your certificate request. What you are about to&lt;br /&gt;
enter is what is called a Distinguished Name or a DN. There are&lt;br /&gt;
quite a few fields but you can leave some blank For some fields&lt;br /&gt;
there will be a default value, If you enter '.', the field will be&lt;br /&gt;
left blank.&lt;br /&gt;
-----&lt;br /&gt;
Level 0 Organization Name (do not modify) [Grid]:&lt;br /&gt;
Level 1 Organization Name (do not modify) [NorduGrid]:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The following questions regards your affiliation domain and your email. It is important that your domain and the domain in the email address is the same.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;Your Domain [example.org]:mydomain.org&lt;br /&gt;
Name (e.g., Hans Christian Andersen) []:Joe User&lt;br /&gt;
Email address (e.g., h.c.andersen@example.org) []:joe.user@&lt;br /&gt;
mydomain.org&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Finally the private key and a certificate request are generated.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;A private key and a certificate request has been generated with&lt;br /&gt;
the subject:&lt;br /&gt;
&lt;br /&gt;
/O=Grid/O=NorduGrid/OU=mydomain.org/CN=Joe User/Email=joe.user@&lt;br /&gt;
mydomain.org&lt;br /&gt;
&lt;br /&gt;
If the CN=Joe User/Email=joe.user@mydomain.org is not appropriate,&lt;br /&gt;
rerun this script with the -force -cn &amp;amp;quot;Common Name&amp;amp;quot; options.&lt;br /&gt;
&lt;br /&gt;
Your private key is stored in /home/joe/.globus/userkey.pem&lt;br /&gt;
Your request is stored in /home/joe/.globus/usercert_request.pem&lt;br /&gt;
&lt;br /&gt;
Please e-mail the request to the NorduGrid Certification Authority&lt;br /&gt;
ca@nbi.dk You may use a command similar to the following:&lt;br /&gt;
&lt;br /&gt;
  cat /home/jonas/.globus/usercert_request.pem | mail ca@nbi.dk&lt;br /&gt;
&lt;br /&gt;
Only use the above if this machine can send AND receive e-mail. if&lt;br /&gt;
not, please mail using some other method.&lt;br /&gt;
&lt;br /&gt;
Your certificate will be mailed to you within two working days. If&lt;br /&gt;
you receive no response, contact NorduGrid Certification Authority&lt;br /&gt;
at ca@nbi.dk&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Creating a certificate request using openssl ==&lt;br /&gt;
&lt;br /&gt;
If grid-proxy-init isn't available you can use ''openssl'' to create a certificate request and a private key. Openssl will ask for a password to protect the private key. Note, if the password or private key is lost, a new certificate must be obtained. The process is shown below:&lt;br /&gt;
&lt;br /&gt;
 $ mkdir -p ~/.globus&lt;br /&gt;
 $ openssl req -new -newkey rsa:2048 \&lt;br /&gt;
   -out ~/.globus/usercert_request.pem \&lt;br /&gt;
   -keyout ~/.globus/userkey.pem \&lt;br /&gt;
   -subj &amp;quot;/O=Grid/O=NorduGrid/OU=nsc.liu.se/CN=Kalle Kula/emailAddress=kalle@nsc.liu.se&amp;quot;&lt;br /&gt;
 Generating a 2048 bit RSA private key&lt;br /&gt;
 .........+++&lt;br /&gt;
 .....................+++&lt;br /&gt;
 writing new private key to '~/.globus/userkey.pem'&lt;br /&gt;
 Enter PEM pass phrase:&lt;br /&gt;
 Verifying - Enter PEM pass phrase:&lt;br /&gt;
 -----&lt;br /&gt;
&lt;br /&gt;
Modify OU, CN and emailAddress as necessary. It is probably important that your OU and the domain in the email address are the same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sending the certificate request to the Nordugrid CA ==&lt;br /&gt;
&lt;br /&gt;
When the certificate request is created there will be 2 files, '''userkey.pem''' and '''usercert_request.pem''', in a subdirectory called '''.globus''' in your home directory. The '''userkey.pem''' is your private key and should not be world readable. This can be achieved by using '''chmod 400 ~/.globus/userkey.pem'''.&lt;br /&gt;
&lt;br /&gt;
The contents of the '''usercert_request.pem''' should be sent by mail to you neareast Registration Authority (RA). The RA will verify your request and verify your identity. This can involve meeting with the RA and proving your identity with a passport or equivalent documents. The current list of RA:s can be found at the following page:&lt;br /&gt;
&lt;br /&gt;
[http://ca.nordugrid.org/ra.html http://ca.nordugrid.org/ra.html]&lt;br /&gt;
&lt;br /&gt;
== Installing the certificate in your home directory ==&lt;br /&gt;
&lt;br /&gt;
When certificate request is signed by the CA you will receive a mail with the certificate.&lt;br /&gt;
&lt;br /&gt;
The important parts of the mail are shown below::&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;-----BEGIN CERTIFICATE-----&lt;br /&gt;
MIIDKDCCApGgAwIBAgICFAgwDQYJKoZIhvcNAQEFBQAwTzENMAsGA1UEChMER3Jp&lt;br /&gt;
ZDESMBAGA1UEChMJTm9yZHVHcmlkMSowKAYDVQQDEyFOb3JkdUdyaWQgQ2VydGlm&lt;br /&gt;
...&lt;br /&gt;
-----END CERTIFICATE-----&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Copy the part shown above into the file '''usercert.pem''' in the '''.globus''' directory in your home directory.&lt;br /&gt;
&lt;br /&gt;
== Installing the certificate in your browser ==&lt;br /&gt;
&lt;br /&gt;
To use the requested certificate in your browser it has to be converted to pkcs12 format. This can be done using the following commands (on a linux/unix based system):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ cd ~/.globus&lt;br /&gt;
$ openssl pkcs12 -export -in usercert.pem -inkey userkey.pem -out DELETE_ME.p12&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
First openssl ask for your passphrase for your private key.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Enter pass phrase for userkey.pem:&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the pkcs12 file will consist of both your public and private key, the generated file is protected by an additional passphrase which openssl asks for:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Enter Export Password:&lt;br /&gt;
Verifying - Enter Export Password:&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The generated file, DELETE_ME.p12, can then be imported into your web browser. &lt;br /&gt;
&lt;br /&gt;
To import the certificate in Firefox, open the &amp;quot;Advanced&amp;quot; tab in the Preferences dialog, and select the &amp;quot;Encryption&amp;quot; tab. Click the &amp;quot;Certificates&amp;quot; button and then the &amp;quot;Import...&amp;quot; button. Select your generated DELETE_ME.p12 file, and Firefox will then ask you for the export passphrase to entered in the openssl command.  In Chrome, the procedure is pretty much the same, except you have to go to &amp;quot;Settings&amp;quot; and click &amp;quot;Under the Hood&amp;quot; in the sidebar and then the &amp;quot;Manage certificates...&amp;quot; button to find the &amp;quot;Import...&amp;quot; button. &lt;br /&gt;
&lt;br /&gt;
On Mac OSX most browsers (except Firefox) use the keychain to store certificates, and you can import DELETE_ME.p12 to the keychain by double clicking it in the finder.&lt;br /&gt;
&lt;br /&gt;
Do not forget to delete DELETE_ME.p12 when you are done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Renewing a NorduGrid user certificate ===&lt;br /&gt;
&lt;br /&gt;
Go into your .globus directory. There you can make a new directory and jump into it to create your new certificates, while still be able to to use the old ones as long as they are valid.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mkdir new`date +%y%m%d`&lt;br /&gt;
cd new`date +%y%m%d`&lt;br /&gt;
openssl req -newkey rsa:2048 -keyout newuserkey.pem -subj &amp;quot;/O=Grid/O=NorduGrid/OU=pdc.kth.se/CN=Firstname Lastname/emailAddress=your-email@pdc.kth.se&amp;quot; -new -out usercert_request.pem&lt;br /&gt;
chmod 400 newuserkey.pem&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note: Firstname Lastname do not need to be uppercase. If you change case/spelling/email-address in your certificate when renewing a certificate, then RT-systems, web-servers, wiki et cetera will likely not recognize you, as it is often done through plain character string matching! So check what your had in your old cert in beforehand.&lt;br /&gt;
&lt;br /&gt;
''Update'': For user certificates it is no longer necessary to create a signaturefile, but this is how you would have done it:&lt;br /&gt;
 openssl dgst -binary -sign ../userkey.pem &amp;lt; usercert_request.pem &amp;gt; req.sig&lt;br /&gt;
&lt;br /&gt;
=== Mailing your renewal request ===&lt;br /&gt;
You will have to send an email with the *_request.pem file inline and the eventual sigfile attached. &lt;br /&gt;
For human readability and faster responsetime it can be recommended to also paste the output of&lt;br /&gt;
 openssl req -in usercert_request.pem -noout -text&lt;br /&gt;
into the body of the email. Another appreciated information is the time when your current certificate will expire.&lt;br /&gt;
The recipient of your email is generally your RA (the one you used when asking for your previous cert, see above) who will control, sign and forward it for you to ca@nordugrid.org.&lt;br /&gt;
&lt;br /&gt;
If you are able to [[Grid_certificates#Signing_your_e-mail_with_your_certificate| sign the mail]] '''(signing doesn't mean attaching!!!)''' with the still valid old certificate in PKCS12 format you can send it directly to the CA at ca@nordugrid.org &lt;br /&gt;
In that case you don't need to give the information of when your current certificate will expire since it is obvious. It is still recommended though that you CC your RA who can then inform you of any expected delays and could point out if your signature doesn't look valid.&lt;/div&gt;</summary>
		<author><name>Michaela Barth (PDC)</name></author>
		
	</entry>
</feed>