> > to a globus container. this will output an epr which can be used to
> > access the delegated credential.
> > 
> > but how can a service access the credentials? where can a service
> > find the security related information?
> 
> Maybe try something like this:
> 
> String caller = org.globus.wsrf.security.SecurityManager.getManager()
>      .getCaller();

thanks, I had already found this one:

        javax.security.auth.Subject 
sub=(Subject)ctx.getProperty(Constants.PEER_SUBJECT);

which returns a java.util.Set containing an array of X509Certificates. however, 
that's not
exactly what I've been looking for -- but see below.

> String remoteAddress = MessageContext.getCurrentContext()
>      .getStrProp(org.apache.axis.Constants.MC_REMOTE_ADDR);

that's intereresting. is the remote addr the address of the interface the 
message
has left the client? if yes, this means that probably private IP addresses would
show up in the message, while a getpeername(2) would probaby return a public
NATed address.


ok, now for the delegated credentials:

with pre-wsgram, a job-proxy is stored at the job-side, pointed to by the
X509_USER_{CERT,PROXY,KEY}. GT4-wsgram also shows this behaviour, e.g.
a job of mine sent via WS shows:

X509_USER_CERT=/home/local/joe/.globus/gram_job_proxy_717d6410-7b52-11dc-ac93-abb5182b27b6
X509_USER_KEY=/home/local/joe/.globus/gram_job_proxy_717d6410-7b52-11dc-ac93-abb5182b27b6


I have two questions related to this ...

(1) how do I instruct the service to generate these X509_USER_* files? I *know* 
they
    exist, but only ... sometimes? Of for some particular jobs? sometimes, the
    job-proxy is not there at all.
    the "how" is meant: API-wise, C and java, and for both: client and service.
    
(2) how is the creation of a job-proxy-file implemented in the service?

best regards,
h.rosmanith

Reply via email to