125:
41:
The database is manipulated by authorization data that defines specific capabilities and roles for users. Administrative tools can be used by administrators to assign roles and capability information in the database. A command-line tool allows users to generate a local proxy credential based on the
42:
contents of the VOMS database. This credential includes the basic authentication information that standard Grid proxy credentials contain, but it also includes role and capability information from the VOMS server.
38:. It is structured as a simple account database with fixed formats for the information exchange and features single login, expiration time, backward compatibility, and multiple virtual organizations.
166:
45:
VOMS-aware applications can use the VOMS data to make authentication decisions regarding user requests. VOMS was originally developed by the
European DataGrid and
63:
used for providing recharge management services for
Prepaid Systems of Telecom Service Providers. Typically external Voucher Management Systems are used with
159:
195:
190:
152:
46:
185:
76:
64:
132:
136:
35:
49:
projects and is now maintained by the
Italian National Institute for Nuclear Physics (
179:
124:
99:
93:
17:
50:
140:
109:
112:The Italian National Institute for Nuclear Physics
103:
160:
8:
167:
153:
32:Virtual Organization Membership Service
100:The VOMS Attribute Certificate Format
7:
121:
119:
25:
123:
1:
139:. You can help Knowledge by
47:Enabling Grids for E-sciencE
212:
118:
61:VOucher Management System
196:Computer security stubs
191:Computer access control
67:based prepaid systems.
59:is also an acronym for
30:is an acronym used for
65:Intelligent Network
148:
147:
133:computer security
16:(Redirected from
203:
169:
162:
155:
127:
120:
96:The VOMS website
21:
211:
210:
206:
205:
204:
202:
201:
200:
176:
175:
174:
173:
116:
104:Open Grid Forum
90:
85:
73:
23:
22:
15:
12:
11:
5:
209:
207:
199:
198:
193:
188:
186:Grid computing
178:
177:
172:
171:
164:
157:
149:
146:
145:
128:
114:
113:
107:
102:standard from
97:
89:
88:External links
86:
84:
81:
80:
79:
72:
69:
36:grid computing
24:
14:
13:
10:
9:
6:
4:
3:
2:
208:
197:
194:
192:
189:
187:
184:
183:
181:
170:
165:
163:
158:
156:
151:
150:
144:
142:
138:
135:article is a
134:
129:
126:
122:
117:
111:
108:
105:
101:
98:
95:
92:
91:
87:
82:
78:
75:
74:
70:
68:
66:
62:
58:
54:
52:
48:
43:
39:
37:
33:
29:
19:
141:expanding it
130:
115:
60:
56:
55:
44:
40:
31:
27:
26:
180:Categories
83:References
77:Shibboleth
71:See also
131:This
137:stub
110:INFN
94:VOMS
57:VOMS
51:INFN
28:VOMS
18:Voms
53:).
34:in
182::
168:e
161:t
154:v
143:.
106:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.