1SYSTEM.ROOTDAEMONRC(1) General Commands Manual SYSTEM.ROOTDAEMONRC(1)
2
3
4
6 Usage of this file is deprecated and will be removed in future versions
7 of ROOT.
8
9 Please contact the ROOT team at http://root.cern.ch in the unlikely
10 event this change is disruptive for your workflow.
11
13 system.rootdaemonrc, .rootdaemonrc - access control directives for ROOT
14 daemons
15
17 ROOTDAEMORC, $HOME/.rootdaemonrc
18 /etc/root/system.rootdaemonrc, $ROOTSYS/etc/system.rootdaemonrc
19
21 This manual page documents the format of directives specifying access
22 control directives for ROOT daemons. These directives are read from a
23 text file whose full path is taken from the environment variable ROOT‐
24 DAEMONRC. If such a variable in undefined, the daemon looks for a file
25 named .rootdaemonrc in the $HOME directory of the user starting the
26 daemon; if this file does not exists either, the file system.rootdae‐
27 monrc, located under /etc/root or $ROOTSYS/etc, is used. If none of
28 these file exists (or is readable), the daemon makes use of a default
29 built-in directive derived from the configuration options of the
30 installation.
31
32
34 * lines starting with '#' are comment lines.
35
36 * hosts can specified either with their name (e.g. pcepsft43),
37 their FQDN (e.g. pcepsft43.cern.ch) or their IP address (e.g.
38 137.138.99.73).
39
40 * directives applying to all host can be specified either by
41 'default' or '*'
42
43 * the '*' character can be used in any field of the name to indi‐
44 cate a set of machines or domains, e.g. pcepsft*.cern.ch applies
45 to all 'pcepsft' machines in the domain 'cern.ch'. (to indicate
46 all 'lxplus' machines you should use 'lxplus*.cern.ch' because
47 internally the generic lxplus machine has a real name of the
48 form lxplusnnn.cern.ch; you can also use 'lxplus' if you don't
49 care about domain name checking).
50
51 * a whole domain can be indicated by its name, e.g. 'cern.ch',
52 'cnaf.infn.it' or '.ch'
53
54 * truncated IP address can also be used to indicate a set of
55 machines; they are interpreted as the very first or very last
56 part of the address; for example, to select 137.138.99.73, any
57 of these is valid: '137.138.99', '137.138', '137`, '99.73'; or
58 with wild cards: '137.13*' or '*.99.73`; however, '138.99' is
59 invalid because ambiguous.
60
61 * the information following the name or IP address indicates, in
62 order of preference, the short names or the internal codes of
63 authentication methods accepted for requests coming from the
64 specified host(s); the ones implemented so far are:
65
66 Method nickname code
67
68 UsrPwd usrpwd 0
69 SRP srp 1
70 Kerberos krb5 2
71 Globus globus 3
72 UidGid uidgid 5 (insecure)
73
74 (The insecure method is intended to speed up access within a
75 cluster protected by other means from outside attacks; should
76 not be used for inter-cluster or inter-domain authentication).
77 Methods non specified explicitly are not accepted. For the inse‐
78 cure method it is possible to give access only to a specific
79 list of users by specifying the usernames after the method sepa‐
80 rated by colons (:) example:
81
82 uidgid:user1:user2:user3
83
84 will allow uidgid access only to users user1, user2 and user3.
85 This is useful to give easy access to data servers. It is also
86 possible to deny access to a user by using a '-' in front of the
87 name:
88
89 uidgid:-user4
90
91 * Lines ending with '´ are followed by additional information for
92 the host on the next line; the name of the host should not be
93 repeated.
94
95
97 Valid examples:
98
99
100 default none
101 All requests are denied unless specified by dedicated direc‐
102 tives.
103
104
105 default 0
106 Authentication mechanisms allowed by default are 'usrpwd' (code
107 0) and 'ssh'
108
109
110 137.138. 0
111 Authentication mechanisms allowed from host in the domain
112 137.138. (cern.ch) are 'usrpwd' (code 0) and 'ssh'
113
114
115 pceple19.cern.ch 1 3 2 5 0
116 All mechanisms are accepted for requests coming from host pce‐
117 ple19.cern.ch .
118
119
120 lxplus*.cern.ch 1 globus 0:qwerty:uytre
121 Requests from the lxplus cluster can authenticate using 'ssh',
122 'srp' and 'globus'; users 'qwerty' and 'uytre' can also use
123 'usrpwd' .
124
125
126 pcep*.cern.ch 0:-qwerty
127 Requests from the pcep*.cern.ch nodes can authenticate using
128 'usrpwd' and 'ssh' when accessing the 'rootd' daemon ; user
129 'qwerty' can only use 'ssh'.
130
131
132 For more information on the ROOT system, please refer to
133 http://root.cern.ch/ .
134
135
137 The ROOT team (see web page above):
138 Rene Brun and Fons Rademakers
139
141 This library is free software; you can redistribute it and/or modify it
142 under the terms of the GNU Lesser General Public License as published
143 by the Free Software Foundation; either version 2.1 of the License, or
144 (at your option) any later version.
145
146 This library is distributed in the hope that it will be useful, but
147 WITHOUT ANY WARRANTY; without even the implied warranty of MER‐
148 CHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser
149 General Public License for more details.
150
151 You should have received a copy of the GNU Lesser General Public
152 License along with this library; if not, write to the Free Software
153 Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301
154 USA
155
157 This manual page was written by G. Ganis <g.ganis@cern.ch> .
158
159
160
161ROOT Version 4 SYSTEM.ROOTDAEMONRC(1)