Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

  1. Register to the dteam VO:

    1. Open the following link

      fill in the requested information and after reading the dteam AUP confirm that you abide to this policy and press the submit button.

      In order to verify your email address an email will be sent to you (if you cannot find the verification email in your inbox please make sure to also check your spam folder). By following the link given within the verification email you will have to select the appropriate NGI/Group manager who will handle your request and press the "Continue" button at the bottom of the page. The NGI/Group Manager you selected will be notified of your request and should handle it. Alastair Dewhurst should be one of the available people from RAL

  2. you’ll receive a certificate bundle (.p12) which you can import into your browser

  3. Convert to PEM Keypair

    Copy the certificate to a file named myCert.p12 to the computer where you will run voms-proxy-init.

    Extract your certificate (which contains the public key) and the private key:

    • Extract the certificate:
      openssl pkcs12 -in myCert.p12 -clcerts -nokeys -out $HOME/.globus/usercert.pem

    • Extract the encrypted private key:
      openssl pkcs12 -in myCert.p12 -nocerts -out $HOME/.globus/userkey.pem

    • You must set the mode on your userkey.pem file to read/write only by the owner, otherwise voms-proxy-init will not use it:

      chmod 600 $HOME/.globus/userkey.pem
      chmod 600 $HOME/.globus/usercert.pem
  • No labels