Register to the dteam VO:
Open the following link
fill in the requested information and after reading the dteam AUP confirm that you abide to this policy and press the submit button.
In order to verify your email address an email will be sent to you (if you cannot find the verification email in your inbox please make sure to also check your spam folder). By following the link given within the verification email you will have to select the appropriate NGI/Group manager who will handle your request and press the "Continue" button at the bottom of the page. The NGI/Group Manager you selected will be notified of your request and should handle it. Alastair Dewhurst should be one of the available people from RAL
you’ll receive a certificate bundle (.p12) which you can import into your browser
Convert to PEM Keypair
Copy the certificate to a file named
myCert.p12
to the computer where you will run voms-proxy-init.Extract your certificate (which contains the public key) and the private key:
Extract the certificate:
openssl pkcs12 -in myCert.p12 -clcerts -nokeys -out $HOME/.globus/usercert.pem
Extract the encrypted private key:
openssl pkcs12 -in myCert.p12 -nocerts -out $HOME/.globus/userkey.pem
You must set the mode on your userkey.pem file to read/write only by the owner, otherwise voms-proxy-init will not use it:
Code Block chmod 600 $HOME/.globus/userkey.pem chmod 600 $HOME/.globus/usercert.pem
If you have lcgui05 or similar, copy the usercert and userkey pem files to ~/.globus
run “voms-proxy-init --voms dteam --valid 96:00“
you can now use xrdcp and gfal-copy to access /dteam from any echo endpoint:
e.g. rdr.echo.stfc.ac.uk (prod echo) , ceph-dev-gw1.gridpp.rl.ac.uk (preprod echo)
Page Comparison
General
Content
Integrations