For VOMS Admin server 3.8.0, VOMS Admin client 2.0.20
In VOMS, a Virtual Organisation (VO) is a named container for a set of VO
members organized in groups. As an example, the atlas
VO at CERN has 3000
registered users and 70 groups.
VOs are managed by one or more VO administrators, i.e. privileged users that are responsible for defining the VO structure (groups, roles, attribute classes), approve user requests and perform other administrative tasks.
This guide is targeted at VO administrators. It introduces the main VOMS administration concepts and functions.
VO administrators are responsible of managing user requests. User requests can be of the following types:
All pending requests are shown in the VO administrator home page, shown below:
When moving the mouse pointer over a request, the approve and reject buttons appear to approve/reject each request.
It is also possible to approve/reject multiple requests with a single click, by selecting them and then approve/reject them with the buttons in the upper right corner of the request table:
Starting with version 3.4.0, VOMS Admin provides support for a VOMS role called ‘Group-Manager’, which, when assigned to a VO member in the context a group, grants privileges to manage group and role requests for such group. The ‘Group-Manager’ role is inactive by default, but its inherent privileges are activated automitcally simply by creating a role with its name in VOMS Admin.
To enable the ‘Group-Manager’ role:
Create the ‘Group-Manager’ Role (see managing roles). If the ‘Group-Manager’ role already exists for the VO, and has a different meaning and use, a custom name for the ‘Group-Manager’ role can be configured. See [VOMS Admin service administrator][service-admin-guide] for details.
Assign the Group-Manager role to those users that will serve as Group managers in the context of the managed group and in the root group context
Note that the Group-Manager role does not grant privileges to approve VO registration requests or to add VO members to a specific group, but only to approve/reject group and role membership request for the managed group.
Group Managers provide a way to:
Group managers can be managed following the “Group Managers” link in the Browse navbar.
Group managers:
Each Group manager should have least the following permissions:
REQUEST_READ REQUEST_WRITE
on the VO root group and in the group they manage.
For more information on ACLs see the Managing authorization.
VO groups can be created and deleted from the “Groups” management page, that can be reached by clicking the “Browse groups” link in the VOMS admin browse navbar:
Clicking on the group name in the “Browse groups” page leads to the “Group information” page, where information about description, membership and attributes defined at the group level can be accessed.
VO roles can be created and deleted from the “Roles” management page, that can be reached by clicking the “Browse roles” link in the VOMS Admin browse navbar:
Clicking on the role name in the “Browse roles” page leads to the “Role information” page, where information about role membership and attributes defined at the role level can be accessed.
Generic attributes (GAs) are (name, value) pairs that that can be assigned to VO users. This information will then be encoded in the VOMS Attribute Certificate issued by the VOMS server as a result for a voms-proxy-init request.
GAs extend the range of attributes that VOMS can issue besides Fully Qualified Attributes Names (FQAN), which is a fancy name for VOMS groups and roles, to allow VOMS to issue any kind of VO membership information that can be expressed as (name, value) pairs. Such information can then be leveraged by VOMS-aware applications to take authorization decisions.
For their nature, GAs are issued to VO users. VOMS however provides a way to quickly assign GAs to all the VO members that belong to a specific VOMS group or that are assigned a specific VOMS role within a group. For this reason, you find GA management in user, group and role management pages in VOMS Admin.
To assign GA to users, the VO admin must first create the corresponding Attribute Class. The Attribute Class is used to define:
The “Attribute classes” management page can be reached by clicking on the “Attributes” link in the navbar, and then clicking on the “Manage attribute classes” link.
GA classes can then be created, specifying the GA name, description and whether uniqueness must be enforced on the GA values assigned directly to users.
Once a GA class has been created, GA values can be assigned to users, groups and role within groups.
As mentioned above, when one GA is assigned directly to a user, the (name,value) couple is added by VOMS to the attribute certificate returned to user. GAs are assigned to users from the “Generic Attributes” panel in the User information page.
When a GA is assigned to a group, or role within a group, such (name, value) pair ends up in the Attribute Certificate of all the VO members belonging to that group (or that have such role within a group). GAs are assigned to groups and roles from the “Generic Attributes” panel in the Group information or Role information pages.
VOMS Admin implements search over user generic attribute values assigned to users, from the “Browse Attributes” page.
The Browse users page provides the following functionality:
The screenshot below shows the “Browse users” page for a WLCG VO:
The “User Information” page gives detailed information about a VO member and provides the administration functionalities to:
To reach the user information page for a given VO member, click the “more info” link for a given member from the “Browse users” page, as shown below:
Suspended members are legitimate members of of the VO, but cannot obtain VOMS attribute certificates from the VOMS server.
To suspend a single user, go to the User information page and click the “Suspend this user” button.
The Browse users page provides a way to suspend multiple users with a single click.
The VO admin can change personal information linked to a VO membership through the “Personal information” panel in the User information page.
For WLCG VOs some fields cannot be changed as the member personal information is synchronized with the contents of the CERN Human Resource database.
The “Groups and roles” panel in the User information page provides the ability to add the VO member to VO groups and assign him VO roles.
The “Certificates” panel in the User information page provides the following functionality:
For general information about AUP management, see the AUP management section.
The “AUP acceptance status” panel in the User information page provides the following functionality:
The “Sign AUP on behalf of the user” button at the top of the User information page allows a VO admin to sign the AUP on behalf of a user.
The “Change HR id” button, at the top of the User information page, allows to change the CERN Human Resource identifier linked to a VOMS membership.
The HR id entered will be validated by VOMS to check if a valid membership for the experiment linked to such id and the currently managed VO is found in the HR database. If the check succeeds, the membership information will be synchronized with the content of the HR membership record at the next run of the VOMS HR database synchronization task.
For security and policy reasons, VO members are request to comply and accept periodically an Acceptable Usage Policy (AUP) document managed by VO administrators that describes the policy that regulates access to resources shared under the auspices of a VO.
VOMS Admin supports this implementing AUP management and keeping track of when users signed a certain version of the VO AUP document. Under the hood, VOMS Admin maintains an acceptance record for each user, that keeps track of which version of the AUP was signed by the user and when.
At any time, there is an AUP document marked as active. This is the document that is presented to VO members that need to sign the AUP, either because their signature has expired or because they are registering for membership in the VO.
The AUP in VOMS Admin has a configurable acceptance period. By default this period is twelve months, so every twelve months each VO member is requested to sign the AUP document in order to be compliant with the VO policy rules. To enforce this constraint, VOMS admin checks each user’s acceptance record against the currently valid AUP acceptance period. If the user AUP signature has expired, the user is notified by email and asked to sign again the AUP.
The user has typically a two weeks grace period (the period duration is configurable) to sign the AUP after his signature has expired. If the user fails to sign the AUP during this grace period, he is automatically suspened by VOMS Admin.
The membership is suspended only until the user signs the AUP following the instructions sent to him by email, or a VO admin signs the AUP on behalf of the user.
Important: no intervention is normally requested from the VO admin to restore the user membership, as the user can restore his membership at any time by just signing the AUP as requested.
The AUP management page can be reached from the “Browse AUP” link in the browse navbar and provides the following functionality:
The default acceptance period duration for the VO AUP is 365 days. This period can be changed by VO administrators, using the change acceptance period form highlighted in the screenshot below:
VOMS Admin allows to keep multiple versions of the AUP document. Only one of these versions is marked as active and presented to users for acceptance.
VOMS Admin stores the AUP as URL pointing to a text file. The default AUP is a file residing in the configuration folder on the VOMS Admin server.
When an AUP version is marked as active, all users that do not have a valid acceptance record for that version are requested to sign the AUP.
To add a new AUP version, follow the “Add a new AUP version” link in the “AUP management page”.
AUP versions not marked as active can be deleted with the “Remove” button in the “AUP management page”
If multiple versions of the AUP are available, the active version can be changed with the “Set active” button in the “AUP management page.”
The VO administrator can request a new signature of the AUP from all the VO users with the “Trigger acceptance” button.
Starting with version 3.4.0, VOMS Admin keeps an audit log of all the actions that change the content of the VOMS database.
The audit log can be accessed by following the “Audit Log” link in the browse navbar.
The page shows the last week of records in the audit log. To change the period use the “From” and “To” fields in the record filter bar, which supports filtering by Principal and event type:
Each audit log record describes an event that changed the contents of the VOMS database, providing the following information:
A compact representation of a log record is shown in the screenshot below:
Clicking the “more info” handle turns on the expanded log record view, which displays the event data in full.
In VOMS-Admin, each operation that accesses or modifies the VOMS database is authorized via the VOMS-Admin Authorization framework.
Authorization policies are expessed as Access Control Lists (ACLs) linked to VOMS groups. ACLs are composed of Access Control Entries (ACEs), which define a mapping between a Principal and a set of VOMS Admin permissions.
A Principal, in the context of an ACE, may be:
A VOMS Admin Permission is a fixed-length sequence of permission flags that describe the set of permissions a VOMS Administrator has in a specific VOMS group. The following table explains in detail the name, meaning and valid scopes of these permission flags: