<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://snicdocs.nsc.liu.se/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Thomas+Svedberg+%28C3SE%29</id>
	<title>SNIC Documentation - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://snicdocs.nsc.liu.se/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Thomas+Svedberg+%28C3SE%29"/>
	<link rel="alternate" type="text/html" href="https://snicdocs.nsc.liu.se/wiki/Special:Contributions/Thomas_Svedberg_(C3SE)"/>
	<updated>2026-04-08T20:40:33Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.10</generator>
	<entry>
		<id>https://snicdocs.nsc.liu.se/w/index.php?title=User:Luis_Fazendeiro_(C3SE)&amp;diff=7226</id>
		<title>User:Luis Fazendeiro (C3SE)</title>
		<link rel="alternate" type="text/html" href="https://snicdocs.nsc.liu.se/w/index.php?title=User:Luis_Fazendeiro_(C3SE)&amp;diff=7226"/>
		<updated>2020-02-04T12:40:29Z</updated>

		<summary type="html">&lt;p&gt;Thomas Svedberg (C3SE): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{application expert info&lt;br /&gt;
|first name=Luis&lt;br /&gt;
|last name=Fazendeiro&lt;br /&gt;
|centre=C3SE&lt;br /&gt;
|fields=Parallel programming&lt;br /&gt;
|fte=25&lt;br /&gt;
|snic ae financing=20&lt;br /&gt;
|other ae financing=&lt;br /&gt;
|financing=SNIC/PRACE&lt;br /&gt;
|general activities=Plasma physics code development, PRACE application support&lt;br /&gt;
|other activities=&amp;lt;!--Semicolon separated list of things you do outside of your work as an application expert.; Like other part time duties.; Use minimal *but complete* sentences.--&amp;gt;&lt;br /&gt;
&amp;lt;!--|image=name of an uploaded image file--&amp;gt;&lt;br /&gt;
|office=&amp;lt;!--Semicolon separated lines; of visiting address; newlines&lt;br /&gt;
are ignored; Provide this only if you want to.--&amp;gt;&lt;br /&gt;
|phone=&amp;lt;!--Semicolon separated phone numbers (with optional &lt;br /&gt;
explanation); newlines are ignored; only add this if you want users to phone you constantly. --&amp;gt;&lt;br /&gt;
|is active=no&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Quick facts ==&lt;br /&gt;
* Email: [mailto:luisfa@chalmers.se luisfa@chalmers.se]&lt;br /&gt;
* Work at Department of Earth and Space Sciences, Chalmers, Transport Theory Group &lt;br /&gt;
* Computational Fluid Dynamics background, PhD at UCL, [http://ccs.chem.ucl.ac.uk/ CCS]&lt;br /&gt;
* MPhil in Theoretical Physics, Coimbra University [http://fisica.uc.pt/yt/main.php], Portugal&lt;br /&gt;
* Research in Image Reconstruction in PET devices, at [http://coimbra.lip.pt/index.php?id=3&amp;amp;prid=31&amp;amp;lg=en LIP-RPC-PET]&lt;br /&gt;
* AE related activities includes&lt;br /&gt;
** [[project::Improved FFT and I/O for the Pencil code]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Expertise ==&lt;br /&gt;
* [[expertise::C]]&lt;br /&gt;
* [[expertise::MPI]]&lt;br /&gt;
* [[expertise::Fortran]]&lt;/div&gt;</summary>
		<author><name>Thomas Svedberg (C3SE)</name></author>
		
	</entry>
	<entry>
		<id>https://snicdocs.nsc.liu.se/w/index.php?title=User:Erik_Fransson_(C3SE)&amp;diff=7221</id>
		<title>User:Erik Fransson (C3SE)</title>
		<link rel="alternate" type="text/html" href="https://snicdocs.nsc.liu.se/w/index.php?title=User:Erik_Fransson_(C3SE)&amp;diff=7221"/>
		<updated>2020-02-04T12:38:19Z</updated>

		<summary type="html">&lt;p&gt;Thomas Svedberg (C3SE): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{application expert info&lt;br /&gt;
|first name=Erik&lt;br /&gt;
|last name=Fransson&lt;br /&gt;
|centre=C3SE&lt;br /&gt;
|fields=Computational materials science&lt;br /&gt;
|fte=100&lt;br /&gt;
&amp;lt;!--|financing= Dont know--&amp;gt;&lt;br /&gt;
|general activities=Various modification and analysis tool development;&lt;br /&gt;
&amp;lt;!--|image=name of an uploaded image file--&amp;gt;&lt;br /&gt;
|office=Soliden floor 3, Chalmers;Origovägen 6 B, Göteborg&lt;br /&gt;
|is active=no&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Quick facts ==&lt;br /&gt;
* Email: erikfr at chalmers dot se&lt;br /&gt;
* Masters degree in Applied Physics&lt;br /&gt;
&lt;br /&gt;
== Expertise ==&lt;br /&gt;
* [[expertise::Python]]&lt;br /&gt;
* [[expertise::ASE]]&lt;br /&gt;
* [[expertise::C++]]&lt;/div&gt;</summary>
		<author><name>Thomas Svedberg (C3SE)</name></author>
		
	</entry>
	<entry>
		<id>https://snicdocs.nsc.liu.se/w/index.php?title=User:Thomas_Svedberg_(C3SE)&amp;diff=6042</id>
		<title>User:Thomas Svedberg (C3SE)</title>
		<link rel="alternate" type="text/html" href="https://snicdocs.nsc.liu.se/w/index.php?title=User:Thomas_Svedberg_(C3SE)&amp;diff=6042"/>
		<updated>2015-02-10T09:13:45Z</updated>

		<summary type="html">&lt;p&gt;Thomas Svedberg (C3SE): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{application expert info&lt;br /&gt;
|first name=Thomas&lt;br /&gt;
|last name=Svedberg&lt;br /&gt;
|centre=C3SE&lt;br /&gt;
|fields=Solid Mechanics&lt;br /&gt;
|other activities=Director at C3SE;Coordinator SNIC User and Project Repository (SUPR)&lt;br /&gt;
|office=Hörsalsvägen 7; 412 96 Göteborg&lt;br /&gt;
|phone=(+46)31 772 1522&lt;br /&gt;
|fte=&lt;br /&gt;
|financing=&lt;br /&gt;
|snic ae financing=&lt;br /&gt;
|other ae financing=LU&lt;br /&gt;
|general activities=&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
* [[project::SUPR]]&lt;br /&gt;
* [[project::SNIC Emerging Technologies]]&lt;/div&gt;</summary>
		<author><name>Thomas Svedberg (C3SE)</name></author>
		
	</entry>
	<entry>
		<id>https://snicdocs.nsc.liu.se/w/index.php?title=User:Thomas_Svedberg_(C3SE)&amp;diff=6040</id>
		<title>User:Thomas Svedberg (C3SE)</title>
		<link rel="alternate" type="text/html" href="https://snicdocs.nsc.liu.se/w/index.php?title=User:Thomas_Svedberg_(C3SE)&amp;diff=6040"/>
		<updated>2015-02-10T09:12:57Z</updated>

		<summary type="html">&lt;p&gt;Thomas Svedberg (C3SE): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{application expert info&lt;br /&gt;
|first name=Thomas&lt;br /&gt;
|last name=Svedberg&lt;br /&gt;
|centre=C3SE&lt;br /&gt;
|fields=&lt;br /&gt;
|other activities=Director at C3SE;Coordinator SNIC User and Project Repository (SUPR)&lt;br /&gt;
|office=Hörsalsvägen 7; 412 96 Göteborg&lt;br /&gt;
|phone=(+46)31 772 1522&lt;br /&gt;
|fte=&lt;br /&gt;
|financing=&lt;br /&gt;
|snic ae financing=&lt;br /&gt;
|other ae financing=LU&lt;br /&gt;
|general activities=&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
* [[project::SUPR]]&lt;br /&gt;
* [[project::SNIC Emerging Technologies]]&lt;/div&gt;</summary>
		<author><name>Thomas Svedberg (C3SE)</name></author>
		
	</entry>
	<entry>
		<id>https://snicdocs.nsc.liu.se/w/index.php?title=User:Thomas_Svedberg_(C3SE)&amp;diff=6038</id>
		<title>User:Thomas Svedberg (C3SE)</title>
		<link rel="alternate" type="text/html" href="https://snicdocs.nsc.liu.se/w/index.php?title=User:Thomas_Svedberg_(C3SE)&amp;diff=6038"/>
		<updated>2015-02-10T09:01:08Z</updated>

		<summary type="html">&lt;p&gt;Thomas Svedberg (C3SE): Created page with &amp;quot;== Projects == * project::SUPR * project::SNIC Emerging Technologies&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Projects ==&lt;br /&gt;
* [[project::SUPR]]&lt;br /&gt;
* [[project::SNIC Emerging Technologies]]&lt;/div&gt;</summary>
		<author><name>Thomas Svedberg (C3SE)</name></author>
		
	</entry>
	<entry>
		<id>https://snicdocs.nsc.liu.se/w/index.php?title=Swestore-dCache&amp;diff=4415</id>
		<title>Swestore-dCache</title>
		<link rel="alternate" type="text/html" href="https://snicdocs.nsc.liu.se/w/index.php?title=Swestore-dCache&amp;diff=4415"/>
		<updated>2012-09-14T07:45:38Z</updated>

		<summary type="html">&lt;p&gt;Thomas Svedberg (C3SE): /* Download and upload data */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Storage]]&lt;br /&gt;
[[Category:SweStore]]&lt;br /&gt;
SNIC is building a storage infrastructure to complement the computational resources.&lt;br /&gt;
&lt;br /&gt;
Many forms of automated measurements can produce large amounts of data. In scientific areas such as high energy physics (the Large Hadron Collider at CERN), climate modeling, bioinformatics, bioimaging etc., the demands for storage are increasing dramatically. To serve these and other user communities, SNIC has appointed a working group to design a storage strategy, taking into account the needs on many levels and creating a unified storage infrastructure, which is now being implemented.&lt;br /&gt;
&lt;br /&gt;
Swestore is in collaboration with [http://www.ecds.se ECDS], [http://snd.gu.se SND], Bioimage Sweden, [http://www.bils.se BILS], [http://www.uppnex.uu.se UPPNEX],[http://http://lcg.web.cern.ch/lcg/public/ WLCG], [http://www.nrm.se/ NaturHistoriska RiksMuseet].&lt;br /&gt;
&lt;br /&gt;
= National storage =&lt;br /&gt;
The aim of the nationally accessible storage is to build a robust, flexible and expandable system that can&lt;br /&gt;
be used in most cases where access to large scale storage is needed. To the user it should appear as a single large system,&lt;br /&gt;
while it is desirable that some parts of the system are distributed across all SNIC centra to benefit from the advantages&lt;br /&gt;
of, among other things, locality and cache effects. The system is intended as a versatile long-term storage system.&lt;br /&gt;
&lt;br /&gt;
==Supported access protocol==&lt;br /&gt;
; Today SweStore support this protocols&lt;br /&gt;
: srm://, gsiftp://, http:// (ro), https:// (ro), webdav (rw).&lt;br /&gt;
; Coming to support this protocols&lt;br /&gt;
: NFS4.1, iRODS&lt;br /&gt;
&lt;br /&gt;
== Getting access ==&lt;br /&gt;
; Apply for storage&lt;br /&gt;
: Please follow instructions [[Apply for storage on SweStore|here]]&lt;br /&gt;
; Get a client certificate.&lt;br /&gt;
: Follow the instructions [[Grid_certificates#Requesting_a_certificate|here]] to get your client certificate. For Terena certificates, please make sure you also [[Requesting_a_grid_certificate_using_the_Terena_eScience_Portal#Exporting Terena certificate for use with Grid tools|export the certificate for use with grid tools]]. For Nordugrid certificates, please make sure to also [[Requesting_a_grid_certificate_from_the_Nordugrid_CA#Installing_the_certificate_in_your_browser|install your client certificate in your browser]].&lt;br /&gt;
; Request membership in the SweGrid VO.&lt;br /&gt;
: Follow the instructions [[Grid_certificates#Requesting_membership_in_the_SweGrid_VO|here]] to get added to the SweGrid virtual organisation.&lt;br /&gt;
&lt;br /&gt;
== Download and upload data ==&lt;br /&gt;
; Browse and download data&lt;br /&gt;
: SweStore is accessible from your web browser, here https://webdav.swegrid.se/. To browse private data you must first install your certificate in your browser (see above). Your data is available at &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;https://webdav.swegrid.se/snic/YOUR_PROJECT_NAME&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt;.&lt;br /&gt;
; Upload and delete data&lt;br /&gt;
: Use the ARC client. Please see the instructions for [[Accessing SweStore national storage with the ARC client]].&lt;br /&gt;
: Use cURL. Please see the instructions for [[Accessing SweStore national storage with the cURL]].&lt;br /&gt;
: Use lftp. Please see the instructions for [[Accessing SweStore national storage with lftp]].&lt;br /&gt;
: Use globus-url-copy. Please see the instructions for [[Accessing SweStore national storage with globus-url-copy]].&lt;br /&gt;
&lt;br /&gt;
== Examples of storage projects ==&lt;br /&gt;
Below are some examples of project that are using SweStore today.&lt;br /&gt;
&lt;br /&gt;
{|border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:left; border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot; class=&amp;quot;wikitable sortable&amp;quot;  valign=top&lt;br /&gt;
!Allocation name&lt;br /&gt;
!Size in TB&lt;br /&gt;
!class=&amp;quot;unsortable&amp;quot;|Project full name&lt;br /&gt;
|-&lt;br /&gt;
|alice&lt;br /&gt;
|400&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|uppnex&lt;br /&gt;
|140&lt;br /&gt;
|[https://www.uppnex.uu.se UPPmax NExt Generation Sequencing Cluster &amp;amp; Storage]&lt;br /&gt;
|-&lt;br /&gt;
|brain_protein_atlas&lt;br /&gt;
|10&lt;br /&gt;
|Mouse brain protein atlas project&lt;br /&gt;
|-&lt;br /&gt;
| scims2lab&lt;br /&gt;
|20&lt;br /&gt;
| Identification of novel gene models by matching mass spectrometry data against 6-frame translations of the human genome&lt;br /&gt;
|-&lt;br /&gt;
|subatom&lt;br /&gt;
|&lt;br /&gt;
|Low-energy nuclear theory and experiment&lt;br /&gt;
|-&lt;br /&gt;
|genomics-gu&lt;br /&gt;
|10&lt;br /&gt;
|Genomics Core Facility, Sahlgrenska academy at University of Gothenburg.&lt;br /&gt;
|-&lt;br /&gt;
|Chemo&lt;br /&gt;
|5TB&lt;br /&gt;
|Genetic interaction networks in human deseas&lt;br /&gt;
|-&lt;br /&gt;
|cesm1_holocene&lt;br /&gt;
|30&lt;br /&gt;
|Arctic sea ice in warm climates&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== More information ==&lt;br /&gt;
* [[SweStore introduction]]&lt;br /&gt;
* [http://status.swestore.se/munin/monitor/monitor/ Per Project Monitoring of Swestore usage]&lt;br /&gt;
* [[Accessing SweStore national storage with the ARC client]]&lt;br /&gt;
&amp;lt;!-- * [[Mounting SweStore national storage via WebDAV|Mounting SweStore national storage via WebDAV (Not recomendated at the moment)]] --&amp;gt;&lt;br /&gt;
If you have any issues using SweStore please do not hesitate to contact [mailto:swestore-support@snic.vr.se swestore-support].&lt;br /&gt;
&lt;br /&gt;
== Tools and scripts ==&lt;br /&gt;
&lt;br /&gt;
There exists a number of tools and utilities developed externally that can be useful. Here are some links:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/samuell/arc_tools ARC_Tools] - Convenience scripts for the arc client (Only a recursive rmdir so far).&lt;br /&gt;
* [http://sourceforge.net/projects/arc-gui-clients ARC Graphical Clients] - Contains the ARC Storage Explorer (SweStore supported development).&lt;br /&gt;
* Transfer script, [http://snicdocs.nsc.liu.se/wiki/SweStore/swstrans_arc swetrans_arc], provided by Adam Peplinski / Philipp Schlatter&lt;br /&gt;
* [http://www.nordugrid.org/documents/SWIG-wrapped-ARC-Python-API.pdf Documentation of the ARC Python API (PDF)]&lt;br /&gt;
&lt;br /&gt;
= Center storage =&lt;br /&gt;
Centre storage, as defined by the SNIC storage group, is a storage solution that lives independently of the computational resources and can be accessed from all such resources at a centre. Key features include the ability to access the same filesystem the same way on all computational resources at a centre, and a unified structure and nomenclature for all centra. Unlike cluster storage which is tightly associated with a single cluster, and thus has a limited life-time, centre storage does not require the users to migrate their own data when clusters are decommissioned, not even when the storage hardware itself is being replaced.&lt;br /&gt;
&lt;br /&gt;
== Unified environment ==&lt;br /&gt;
To make the usage more transparent for SNIC users, a set of environment variables are available on all SNIC resources:&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;SNIC_BACKUP&amp;lt;/code&amp;gt; – the user's primary directory at the centre&amp;lt;br&amp;gt;(the part of the centre storage that is backed up)&lt;br /&gt;
* &amp;lt;code&amp;gt;SNIC_NOBACKUP&amp;lt;/code&amp;gt; – recommended directory for project storage without backup&amp;lt;br&amp;gt;(also on the centre storage)&lt;br /&gt;
* &amp;lt;code&amp;gt;SNIC_TMP&amp;lt;/code&amp;gt; – recommended directory for best performance during a job&amp;lt;br&amp;gt;(local disk on nodes if applicable)&lt;/div&gt;</summary>
		<author><name>Thomas Svedberg (C3SE)</name></author>
		
	</entry>
	<entry>
		<id>https://snicdocs.nsc.liu.se/w/index.php?title=User:Torben_Rasmussen_(NSC)/SweGrid_old/Grid_certificates&amp;diff=392</id>
		<title>User:Torben Rasmussen (NSC)/SweGrid old/Grid certificates</title>
		<link rel="alternate" type="text/html" href="https://snicdocs.nsc.liu.se/w/index.php?title=User:Torben_Rasmussen_(NSC)/SweGrid_old/Grid_certificates&amp;diff=392"/>
		<updated>2011-04-27T07:37:05Z</updated>

		<summary type="html">&lt;p&gt;Thomas Svedberg (C3SE): &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A certificate is the equivalent of a passport in real-life. In the same way you have prove your credentials when you aquire a passport the same is true for a certificate. A Certificate Authority (CA) has to vouch for your identity and sign your certificate.&lt;br /&gt;
&lt;br /&gt;
A certificate consist of 2 parts a private key and a public key. The private is your secret and should be kept as secure as possible. The public key is used to verify signatures are signed with your private key for the receiving part. The public part is also used to verify that the certficate is correct when you have the public part of the CA certificate.&lt;br /&gt;
&lt;br /&gt;
For more information regarding certificates and public key cryptography: [http://en.wikipedia.org/wiki/Public-key_cryptography [http://en.wikipedia.org/wiki/Public-key_cryptography http://en.wikipedia.org/wiki/Public-key_cryptography]] [http://en.wikipedia.org/wiki/Public_key_certificate [http://en.wikipedia.org/wiki/Public_key_certificate http://en.wikipedia.org/wiki/Public_key_certificate]]&lt;br /&gt;
&lt;br /&gt;
= Requesting a certificate with the Terena eScience Gateway =&lt;br /&gt;
&lt;br /&gt;
The Terena eScience Gateway is a joint effort to provide users with a tool for requesting grid-certificate with the credentials from their home-institution or university.  &lt;br /&gt;
&lt;br /&gt;
To request a Terena eScience Certificate go to the following URL:&lt;br /&gt;
&lt;br /&gt;
[https://tcs-escience-portal.terena.org [https://tcs-escience-portal.terena.org]] &lt;br /&gt;
&lt;br /&gt;
The procedure is as follows:&lt;br /&gt;
&lt;br /&gt;
1. Click &amp;quot;Login&amp;quot;&lt;br /&gt;
2. Click on Sweden in the map.&lt;br /&gt;
3. Choose your identity provider in the drop down box.&lt;br /&gt;
4. Login using your credentials from your identity provider.&lt;br /&gt;
&lt;br /&gt;
You should now arrive to a &amp;quot;home&amp;quot; page that shown below:&lt;br /&gt;
&lt;br /&gt;
[[File:terena1.png|600px]]&lt;br /&gt;
&lt;br /&gt;
5. Click on the &amp;quot;My certificates&amp;quot; link in the top left side of the page. You should then arrive to a page from which you will create and manage your certificates.&lt;br /&gt;
&lt;br /&gt;
[[File:terena2.png|600px]]&lt;br /&gt;
&lt;br /&gt;
6. To create a new certificate, click on the &amp;quot;New certificate&amp;quot; link and follow the instructions. When the process is completed your certificate will be listed on the same page.&lt;br /&gt;
&lt;br /&gt;
7. Install the signed certificate in your browser by clicking on the &amp;quot;Install in keystore&amp;quot; link. This will install the certificate in the key-store of your browser.&lt;br /&gt;
&lt;br /&gt;
== Exporting Terena certificate for use with Grid tools ==&lt;br /&gt;
&lt;br /&gt;
To use the Terena certificates with the ARC grid client they have to be exported from the browser and converted into a suitable format. To export and convert a certificate installed the following procedure can be used:&lt;br /&gt;
&lt;br /&gt;
1. Export the installed certificate from the browser in the PKCS12 format. In Firefox this is accomplished from the Options/Advanced/Encryption Dialog, shown below:&lt;br /&gt;
&lt;br /&gt;
[[File:browser1.png|400px]] &lt;br /&gt;
&lt;br /&gt;
To show all installed certificate click on the &amp;quot;View Certificates&amp;quot; buttton. This will shown the following dialog:&lt;br /&gt;
&lt;br /&gt;
[[File:browser2.png|400px]]&lt;br /&gt;
&lt;br /&gt;
To backup your newly created certificate select the Terena certificate and click on the &amp;quot;Backup&amp;quot; button in the previous dialog. This brings up a dialog for selecting a filename and location for the certificate. Save your certificate in a good location. The file with be given the extension .p12 indicating that it is a PKCS12 certificate. When the location has been selected another dialog is shown asking for a export password. This password will protect the certificate and private key. As show in the next figure:&lt;br /&gt;
&lt;br /&gt;
[[File:browser3.png|400px]]&lt;br /&gt;
&lt;br /&gt;
Use the password quality meter to choose a strong password for the exported certificate and private key.&lt;br /&gt;
&lt;br /&gt;
2. Converting the PKCS12 certificate to a format suitable for use with grid clients (PEM)&lt;br /&gt;
&lt;br /&gt;
Create a directory, .globus, in your home directory.&lt;br /&gt;
&lt;br /&gt;
Linux / Unix:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;$ cd ~&lt;br /&gt;
$ mkdir .globus&lt;br /&gt;
$ cd .globus&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In windows&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;C:\...\&amp;gt;cd C:\Users\&amp;lt;username&amp;gt;&lt;br /&gt;
C:\...\&amp;gt;mkdir .globus&lt;br /&gt;
C:\...\&amp;gt;cd .globus&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using the &amp;quot;openssl&amp;quot; command we now convert the exported certifcate to the correct format. '''Windows users:''' OpenSSL for Windows is available [http://www.openssl.org/related/binaries.html here].&lt;br /&gt;
&lt;br /&gt;
The first step is to convert the private key. The openssl command will first ask for the password chosen when the certificate was exported (&amp;quot;Enter Import Password:&amp;quot;). In the next step the pass phrase for the exported private key is chosen (&amp;quot;Enter PEM pass phrase:&amp;quot;). Please choose a strong passphrase. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;openssl pkcs12 -nocerts -in usercert.p12 -out userkey.pem&lt;br /&gt;
Enter Import Password:&lt;br /&gt;
MAC verified OK&lt;br /&gt;
Enter PEM pass phrase:&lt;br /&gt;
Verifying - Enter PEM pass phrase:&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the next step the certificate is converted. In the same way as with the private key we have to specify the export password again (&amp;quot;Enter Import Password:&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;openssl pkcs12 -clcerts -nokeys -in usercert.p12 -out usercert.pem&lt;br /&gt;
Enter Import Password:&lt;br /&gt;
MAC verified OK&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Before we can use the private key with or client tools the permissions on the private key file (userkey.pem) has to changed to a more restrictive setting (Linux/Unix):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;chmod 400 userkey.pem&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Requesting a certificate with ARC tools =&lt;br /&gt;
&lt;br /&gt;
The first step in aquiring a certificate is to create a certificate request. This is done using the '''grid-cert-request -int''' command. (The -int options means interactive usage). When issued, the tool will generate a certificate request and a private key. The tool will also ask for a password to protect the private key. Note, if the password is lost a new certificate must be obtained. The process is shown below:&lt;br /&gt;
&lt;br /&gt;
First the private key is generated:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;$ grid-cert-request -int&lt;br /&gt;
A certificate request and private key is being created.&lt;br /&gt;
You will be asked to enter a PEM pass phrase.&lt;br /&gt;
This pass phrase is akin to your account password,&lt;br /&gt;
and is used to protect your key file.&lt;br /&gt;
If you forget your pass phrase, you will need to&lt;br /&gt;
obtain a new certificate.&lt;br /&gt;
&lt;br /&gt;
Using configuration from /etc/grid-security/globus-user-ssl.conf&lt;br /&gt;
Generating a 1024 bit RSA private key&lt;br /&gt;
.....................................++++++&lt;br /&gt;
....................++++++&lt;br /&gt;
writing new private key to '/home/jonas/.globus/userkey.pem'&amp;lt;/pre&amp;gt;&lt;br /&gt;
To protect the private key from unauthorized access it is encrypted using a pass phrase. If this pass phrase is empty, anyone with access to your private key and certificate can gain access to the resources you have been granted. The pass phrase should also be different from your normal login password, so if your local system has been compromised the private key is still protected.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;-----&lt;br /&gt;
You are about to be asked to enter information that will be&lt;br /&gt;
incorporated into your certificate request. What you are about to&lt;br /&gt;
enter is what is called a Distinguished Name or a DN. There are&lt;br /&gt;
quite a few fields but you can leave some blank For some fields&lt;br /&gt;
there will be a default value, If you enter '.', the field will be&lt;br /&gt;
left blank.&lt;br /&gt;
-----&lt;br /&gt;
Level 0 Organization Name (do not modify) [Grid]:&lt;br /&gt;
Level 1 Organization Name (do not modify) [NorduGrid]:&amp;lt;/pre&amp;gt;&lt;br /&gt;
The following questions regards your affiliation domain and your email. It is important that your domain and the domain in the email address is the same.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;Your Domain [example.org]:mydomain.org&lt;br /&gt;
Name (e.g., Hans Christian Andersen) []:Joe User&lt;br /&gt;
Email address (e.g., h.c.andersen@example.org) []:joe.user@&lt;br /&gt;
mydomain.org&amp;lt;/pre&amp;gt;&lt;br /&gt;
Finally the private key and a certificate request are generated.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;A private key and a certificate request has been generated with&lt;br /&gt;
the subject:&lt;br /&gt;
&lt;br /&gt;
/O=Grid/O=NorduGrid/OU=mydomain.org/CN=Joe User/Email=joe.user@&lt;br /&gt;
mydomain.org&lt;br /&gt;
&lt;br /&gt;
If the CN=Joe User/Email=joe.user@mydomain.org is not appropriate,&lt;br /&gt;
rerun this script with the -force -cn &amp;amp;quot;Common Name&amp;amp;quot; options.&lt;br /&gt;
&lt;br /&gt;
Your private key is stored in /home/joe/.globus/userkey.pem&lt;br /&gt;
Your request is stored in /home/joe/.globus/usercert_request.pem&lt;br /&gt;
&lt;br /&gt;
Please e-mail the request to the NorduGrid Certification Authority&lt;br /&gt;
ca@nbi.dk You may use a command similar to the following:&lt;br /&gt;
&lt;br /&gt;
  cat /home/jonas/.globus/usercert_request.pem | mail ca@nbi.dk&lt;br /&gt;
&lt;br /&gt;
Only use the above if this machine can send AND receive e-mail. if&lt;br /&gt;
not, please mail using some other method.&lt;br /&gt;
&lt;br /&gt;
Your certificate will be mailed to you within two working days. If&lt;br /&gt;
you receive no response, contact NorduGrid Certification Authority&lt;br /&gt;
at ca@nbi.dk&amp;lt;/pre&amp;gt;&lt;br /&gt;
The result of the command are 3 files '''userkey.pem''' , '''usercert.pem''' and '''usercert_request.pem''' in a subdirectory called '''.globus''' in the user home directory. The '''userkey.pem''' your private key and should not be world readable. This can be achieved by using '''chmod 400 userkey.pem'''.&lt;br /&gt;
&lt;br /&gt;
The contents of the '''usercert_request.pem''' should be sent by mail to you neareast Registration Authority (RA) by mail. The RA will verify your request and varify your identity. This can involve meeting with the RA and proving your identity with a passport or equivalent documents. The current list of RA:s can be found at the following page:&lt;br /&gt;
&lt;br /&gt;
[http://ca.nordugrid.org/ra.html [http://ca.nordugrid.org/ra.html http://ca.nordugrid.org/ra.html]]&lt;br /&gt;
&lt;br /&gt;
== Installing certificate ==&lt;br /&gt;
&lt;br /&gt;
When the signed certificate is received from the CA it has to be added to the '''usercert.pem''' file in the '''.globus''' directory.&lt;br /&gt;
&lt;br /&gt;
The important parts of the mail are shown below::&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;-----BEGIN CERTIFICATE-----&lt;br /&gt;
xasdj ...&lt;br /&gt;
-----END CERTIFICATE-----&amp;lt;/pre&amp;gt;&lt;br /&gt;
Copy the part shown above into the file &amp;lt;tt&amp;gt;usercert.pem&amp;lt;/tt&amp;gt; in the &amp;lt;tt&amp;gt;.globus&amp;lt;/tt&amp;gt; directory in your home directory.&lt;br /&gt;
&lt;br /&gt;
= Verifying the certificate =&lt;br /&gt;
&lt;br /&gt;
To verify that the certificate is correctly installed, issue the following command::&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;$ [jonas@localhost ~]$ arcproxy --info&lt;br /&gt;
Subject: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann/CN=proxy&lt;br /&gt;
Identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
Time left for proxy: 11 hours 54 minutes 55 seconds&lt;br /&gt;
Proxy path: /tmp/x509up_u500&lt;br /&gt;
Proxy type: Legacy Globus impersonation proxy&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This should display your Distinguished Name (DN) of the installed certificate.&lt;br /&gt;
&lt;br /&gt;
= Requesting membership in the SweGrid VO =&lt;br /&gt;
&lt;br /&gt;
To be able to use the SweGrid resources a membership in the SweGrid VO and a corresponding group is required. To apply for membership, make sure that your certificate is installed in the browser. Then go to the following URL:&lt;br /&gt;
&lt;br /&gt;
[https://voms.ndgf.org:8443/voms/swegrid.se https://voms.ndgf.org:8443/voms/swegrid.se]&lt;br /&gt;
&lt;br /&gt;
and follow the instructions. In a couple of hours you will be added to the SweGrid VO. To be added to the correct SNIC project send a mail to support@swegrid.se and specify your DN as shown in the Terena portal or from the '''arproxy --info''' command and which SNIC-project to be added to.&lt;br /&gt;
&lt;br /&gt;
= Proxy certificates =&lt;br /&gt;
&lt;br /&gt;
Authentication on the grid is done by using special shortlived proxy certificates, which delegate authentication to specific resources.&lt;br /&gt;
&lt;br /&gt;
== Creating a proxy certificate ==&lt;br /&gt;
&lt;br /&gt;
To create a shortlived proxy that can be used for authentication with grid services, the '''arcproxy''' command can be used. A 12 hour (default) proxy is created in the following example::&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[jonas@localhost ~]$ arcproxy&lt;br /&gt;
Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
Enter pass phrase for /home/jonas/.globus/userkey.pem:&lt;br /&gt;
.++++++&lt;br /&gt;
.....++++++&lt;br /&gt;
Proxy generation succeeded&lt;br /&gt;
Your proxy is valid until: 2011-03-11 03:00:14&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The proxy file itself will be created in the '''/tmp''' directory with the format '''x509up_[uid]''', where uid is the userid number for your user account.&lt;br /&gt;
&lt;br /&gt;
In some cases a longer lived proxy will be needed. This is achieved using the '''--constraint''' switch. A 24-hour can be created by issuing the following command:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[jonas@localhost ~]$ arcproxy --constraint=&amp;quot;validityPeriod=24H&amp;quot;&lt;br /&gt;
Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
Enter pass phrase for /home/jonas/.globus/userkey.pem:&lt;br /&gt;
....++++++&lt;br /&gt;
.....++++++&lt;br /&gt;
Proxy generation succeeded&lt;br /&gt;
Your proxy is valid until: 2011-03-11 15:03:19&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' When using ARC 0.8.x a GSI proxy is required. To generate a GSI proxy, the '''--old''' or '''-O''' switches can be used:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[jonas@localhost ~]$ arcproxy -O&lt;br /&gt;
Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
Enter pass phrase for /home/jonas/.globus/userkey.pem:&lt;br /&gt;
................++++++&lt;br /&gt;
......++++++&lt;br /&gt;
Proxy generation succeeded&lt;br /&gt;
Your proxy is valid until: 2011-03-11 03:15:04&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Checking proxy lifetime ==&lt;br /&gt;
&lt;br /&gt;
The remaining lifetime of a proxy-certificate can be queried using the '''arcproxy''' command using the '''--info''' switch.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ arcproxy --info&lt;br /&gt;
[jonas@localhost ~]$ arcproxy --info&lt;br /&gt;
Subject: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann/CN=1567862803&lt;br /&gt;
Identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
Time left for proxy: 11 hours 55 minutes&lt;br /&gt;
Proxy path: /tmp/x509up_u500&lt;br /&gt;
Proxy type: X.509 Proxy Certificate Profile RFC compliant restricted proxy&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Which shows that the proxy certificate is valid for 11 hours 59 minutes.&lt;br /&gt;
&lt;br /&gt;
If a GSI proxy was generated the output would be:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[jonas@localhost ~]$ arcproxy --info&lt;br /&gt;
Subject: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann/CN=proxy&lt;br /&gt;
Identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
Time left for proxy: 11 hours 54 minutes 57 seconds&lt;br /&gt;
Proxy path: /tmp/x509up_u500&lt;br /&gt;
Proxy type: Legacy Globus impersonation proxy&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Destroying a proxy certificate ==&lt;br /&gt;
&lt;br /&gt;
A proxy can be destroyed with the '''-r''' or '''--remove''' switches.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;$ arcproxy -r&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
or&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;$ arcproxy --remove&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Creating a proxy certificate (ARC 0.8.x) ==&lt;br /&gt;
&lt;br /&gt;
To create a shortlived proxy that can be used for authentication with grid services, the '''grid-proxy-init''' command can be used. A 12 hour (default) proxy is created in the following example::&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;$ grid-proxy-init &lt;br /&gt;
Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
Enter GRID pass phrase for this identity:&lt;br /&gt;
Creating proxy .................................................... Done&lt;br /&gt;
Your proxy is valid until: Tue Jan 25 01:22:59 2011&amp;lt;/pre&amp;gt;&lt;br /&gt;
The proxy file itself will be created in the &amp;lt;tt&amp;gt;/tmp&amp;lt;/tt&amp;gt; directory with the format &amp;lt;tt&amp;gt;x509up_[uid]&amp;lt;/tt&amp;gt;, where uid is the userid number for your user account.&lt;br /&gt;
&lt;br /&gt;
In some cases a longer lived proxy will be needed. This is achieved using the '''-valid''' switch. A 24-hour can be created by issuing the following command:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;[jonas@localhost ~]$ grid-proxy-init -valid 24:00&lt;br /&gt;
Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
Enter GRID pass phrase for this identity:&lt;br /&gt;
Creating proxy ................................................... Done&lt;br /&gt;
Your proxy is valid until: Thu Feb 10 18:48:34 2011 &amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Checking proxy lifetime (ARC 0.8.x) ==&lt;br /&gt;
&lt;br /&gt;
The remaining lifetime of a proxy-certificate can be queried using the '''grid-proxy-info''' command:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;$ grid-proxy-info&lt;br /&gt;
subject  : /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann/CN=704530122&lt;br /&gt;
issuer   : /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
identity : /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
type     : RFC 3820 compliant impersonation proxy&lt;br /&gt;
strength : 512 bits&lt;br /&gt;
path     : /tmp/x509up_u500&lt;br /&gt;
timeleft : 0:00:00&amp;lt;/pre&amp;gt;&lt;br /&gt;
In this case the proxy has expired. Creating a new proxy-certificate with the '''grid-proxy-init''' command produces the following output from '''grid-proxy-info''':&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;$ grid-proxy-info&lt;br /&gt;
subject  : /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann/CN=1908712807&lt;br /&gt;
issuer   : /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
identity : /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
type     : RFC 3820 compliant impersonation proxy&lt;br /&gt;
strength : 512 bits&lt;br /&gt;
path     : /tmp/x509up_u500&lt;br /&gt;
timeleft : 11:59:55&amp;lt;/pre&amp;gt;&lt;br /&gt;
Which shows that the proxy certificate is valid for 11 hours 59 minutes.&lt;br /&gt;
&lt;br /&gt;
== Destroying a proxy certificate (ARC 0.8.x) ==&lt;br /&gt;
&lt;br /&gt;
A proxy certificate can be destroyed using the '''grid-proxy-destroy''' command. This command will essentially just delete the temporary proxy file created with '''grid-proxy-init'''&lt;br /&gt;
&lt;br /&gt;
= VOMS certificates =&lt;br /&gt;
&lt;br /&gt;
To use the SweStore national storage resources a membership in a virtual organisation, VO, is required. When accessing the storage resources a special grid proxy certificate is required which indicates VO membership. The special proxy certificate requires that it is signed by the virtual organisation management server, VOMS. To enable this signing process, configuration files have to be added to the system. First a '''$HOME/.voms/vomses''' file with the following contents must be added:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;quot;swegrid.se&amp;quot; &amp;quot;voms.ndgf.org&amp;quot; &amp;quot;15009&amp;quot; &amp;quot;/O=Grid/O=NorduGrid/CN=host/voms.ndgf.org&amp;quot; &amp;quot;swegrid.se&amp;quot;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Next the file '''/etc/grid-security/vomsdir/swegrid.se/voms.ndgf.org.lsc''' with the following contents:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;/O=Grid/O=NorduGrid/CN=host/voms.ndgf.org&lt;br /&gt;
/O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Creating a VOMS proxy (ARC 0.8.x) ==&lt;br /&gt;
&lt;br /&gt;
To create a proxy certificate the, '''voms-proxy-init''', command is used. In the following example a voms proxy certificate is created with membership in the '''ops''' group.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[jonas@localhost ~]$ voms-proxy-init -voms swegrid.se:/swegrid.se/ops&lt;br /&gt;
&lt;br /&gt;
Enter GRID pass phrase:&lt;br /&gt;
Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
Creating temporary proxy ............................................................. Done&lt;br /&gt;
Contacting  voms.ndgf.org:15009 [/O=Grid/O=NorduGrid/CN=host/voms.ndgf.org] &amp;quot;swegrid.se&amp;quot; Done&lt;br /&gt;
Creating proxy .......................................................... Done&lt;br /&gt;
Your proxy is valid until Thu Mar 10 23:14:57 2011&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Creating a VOMS proxy (ARC 1.x) ==&lt;br /&gt;
&lt;br /&gt;
VOMS proxies in ARC 1.x can be created using the '''arcproxy''' command and the '''-S''' or '''--voms''' switches as shown in the following example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[jonas@localhost ~]$ arcproxy -S swegrid.se:/swegrid.se/ops&lt;br /&gt;
Your identity: /O=Grid/O=NorduGrid/OU=lunarc.lu.se/CN=Jonas Lindemann&lt;br /&gt;
Enter pass phrase for /home/jonas/.globus/userkey.pem:&lt;br /&gt;
.....++++++&lt;br /&gt;
............++++++&lt;br /&gt;
Contacting VOMS server (named swegrid.se): voms.ndgf.org on port: 15009&lt;br /&gt;
Proxy generation succeeded&lt;br /&gt;
Your proxy is valid until: 2011-03-10 23:33:06&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Thomas Svedberg (C3SE)</name></author>
		
	</entry>
</feed>