Ian, I think it is the user identity that is used, not the proxy. There has
to exist 'A' valid proxy for the user DN, not necessarily the same one.
John
>-----Original Message-----
>From: Ian Stokes-Rees [mailto:[log in to unmask]]
>Sent: 19 February 2004 08:30
>To: [log in to unmask]
>Subject: Retreiving output files
>
>
>Hi,
>
>How does job output retrieval work if the proxy used to submit
>a job has
>expired? Does GSI provide a mechanism to identify that the
>proxy used for
>a "fetch output" command has the same lineage as the expired
>proxy used to
>submit the job, and therefore allows the operation?
>
>Also, I'm still looking for information regarding the RB security
>architecture. I haven't been able to find this in any of the RB
>documention/papers/reports.
>
>Cheers,
>
>Ian
>
>--
>Ian Stokes-Rees [log in to unmask]
>Particle Physics, Oxford http://www-pnp.physics.ox.ac.uk/~stokes
>
|