000200880 001__ 200880
000200880 005__ 20210129215551.0
000200880 0247_ $$2doi$$a10.1109/UCC.2014.118
000200880 037__ $$aFZJ-2015-03248
000200880 1001_ $$0P:(DE-Juel1)132191$$aMemon, Ahmed$$b0$$eCorresponding author$$ufzj
000200880 1112_ $$a2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC)$$cLondon$$d2014-12-08 - 2014-12-11$$wUnited Kingdom
000200880 245__ $$aFederated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure
000200880 260__ $$bIEEE$$c2014
000200880 29510 $$a2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing : [Proceedings] - IEEE, 2014. - ISBN 978-1-4799-7881-6 - doi:10.1109/UCC.2014.118
000200880 300__ $$a726 - 731
000200880 3367_ $$0PUB:(DE-HGF)8$$2PUB:(DE-HGF)$$aContribution to a conference proceedings$$bcontrib$$mcontrib$$s1436181722_7441
000200880 3367_ $$033$$2EndNote$$aConference Paper
000200880 3367_ $$2ORCID$$aCONFERENCE_PAPER
000200880 3367_ $$2DataCite$$aOutput Types/Conference Paper
000200880 3367_ $$2DRIVER$$aconferenceObject
000200880 3367_ $$2BibTeX$$aINPROCEEDINGS
000200880 520__ $$aOne of the challenges in a distributed data infrastructure is how users authenticate to the infrastructure, and how their authorisations are tracked. Each user community comes with its own established practices, all different, and users are put off if they need to use new, difficult tools. From the perspective of the infrastructure project, the level of assurance must be high enough, and it should not be necessary to reimplement an authentication and authorisation infrastructure (AAI). In the EUDAT project, we chose to implement a mostly loosely coupled approach based on the outcome of the Contrail and Unicore projects. We have preferred a practical approach, combining the outcome of several projects who have contributed parts of the puzzle. The present paper aims to describe the experiences with the integration of these parts. Eventually, we aim to have a full framework which will enable us to easily integrate new user communities and new services.
000200880 536__ $$0G:(DE-HGF)POF2-412$$a412 - Grid Technologies and Infrastructures (POF2-412)$$cPOF2-412$$fPOF II$$x0
000200880 536__ $$0G:(EU-Grant)283304$$aEUDAT - EUropean DATa (283304)$$c283304$$fFP7-INFRASTRUCTURES-2011-2$$x1
000200880 588__ $$aDataset connected to CrossRef Conference
000200880 7001_ $$0P:(DE-HGF)0$$aJensen, Jens$$b1
000200880 7001_ $$0P:(DE-HGF)0$$aCernivec, Ale$$b2
000200880 7001_ $$0P:(DE-HGF)0$$aBenedyczak, Krzysztof$$b3
000200880 7001_ $$0P:(DE-Juel1)132239$$aRiedel, Morris$$b4$$ufzj
000200880 773__ $$a10.1109/UCC.2014.118
000200880 909CO $$ooai:juser.fz-juelich.de:200880$$pec_fundedresources$$pVDB$$popenaire
000200880 9101_ $$0I:(DE-588b)5008462-8$$6P:(DE-Juel1)132191$$aForschungszentrum Jülich GmbH$$b0$$kFZJ
000200880 9101_ $$0I:(DE-588b)5008462-8$$6P:(DE-Juel1)132239$$aForschungszentrum Jülich GmbH$$b4$$kFZJ
000200880 9132_ $$0G:(DE-HGF)POF3-512$$1G:(DE-HGF)POF3-510$$2G:(DE-HGF)POF3-500$$aDE-HGF$$bKey Technologies$$lSupercomputing & Big Data $$vData-Intensive Science and Federated Computing$$x0
000200880 9131_ $$0G:(DE-HGF)POF2-412$$1G:(DE-HGF)POF2-410$$2G:(DE-HGF)POF2-400$$3G:(DE-HGF)POF2$$4G:(DE-HGF)POF$$aDE-HGF$$bSchlüsseltechnologien$$lSupercomputing$$vGrid Technologies and Infrastructures$$x0
000200880 9141_ $$y2015
000200880 9201_ $$0I:(DE-Juel1)JSC-20090406$$kJSC$$lJülich Supercomputing Center$$x0
000200880 980__ $$acontrib
000200880 980__ $$aVDB
000200880 980__ $$aI:(DE-Juel1)JSC-20090406
000200880 980__ $$aUNRESTRICTED