Globus Connect Server version 4 Installation
This page explains how to install Globus Connect Server. It assumes that you have already followed the instructions on the Pre-Installation Planning page.
Firewall Configuration
Before installing Globus, your host firewall should be configured. Using a host firewall reduces transfer performance by a negligible amount, in exchange for increased security (particularly for the GridFTP control connection).
The list of ports needed were detailed on the Pre-Installation Planning page. As a reminder, here are the required ports:
-
Inbound from
54.237.254.192/29
on TCP ports2811
(in all cases) and7512
(for MyProxy and MyProxy OAuth authentication. -
If using MyProxy OAuth authentication, inbound from all IPs to TCP port
443
. -
Inbound and outbound to/from all IPs on TCP and UDP ports
50000
to51000
(inclusive). -
Outbound to
52.84.0.0/15
and54.237.254.192/29
on TCP port443
.
Ready-made configurations are available for the following firewall managers:
File Permissions and Directory Configuration
Before installing software, it is worth noting how Globus works with local accounts and file permissions.
Local file permissions apply when Globus tries to read or write files from an endpoint. Globus performs all actions as a user. Which user, however, depends on the type of endpoint:
-
With a Globus Connect Server endpoint, when acting on behalf of an authenticated user, Globus performs all actions with that user’s local username.
-
Within a shared endpoint, Globus performs all actions with the identity of the user who created the shared endpoint.
As for the owning group, once Globus identifies the username to use, that user’s primary group will be the group used for all files and directories created by the “user”.
This behavior means that all of your users must be enumerable from your Globus Connect Server endpoint. Also, if your endpoint has access to networked POSIX storage (CephFS, GPFS, Lustre, NFS, etc.), the storage environment should use the same users/groups view as the endpoint.
Although the endpoint must be able to enumerate users, that does not mean users
have to be able to log in. For example, let’s assume that, on the endpoint,
each user’s home directory is at path /mnt/filer/home/USERNAME
, and that the
group with ID number 101
should be used as a common group (instead of the
user’s normal primary group). Also, we want to prevent users from logging in
directly.
If you are using flat files (for example, /etc/passwd
), ensure that each
user’s home directory is set appropriately, and that their shell points to
/sbin/nologin
.
If you are using nslcd to authenticate with LDAP, add these lines:
map passwd homeDirectory "/mnt/filer/home/$uid"
map passwd gidNumber "101"
map passwd loginShell "/sbin/nologin"
If you are using sssd, place these lines in
the [domain]
section you have defined for LDAP:
override_shell = /sbin/nologin
override_gid = 101
override_homedir = /mnt/filer/home/%u
The above configurations can be tailored to your needs. For example, if users
do not have a home directory in this environment, you can use /var/empty
.
Or, if the user’s default group is OK, you can remove the override_gid
or
map passwd gidNumber
line.
Software Installation
To install the Globus Connect Server software, you will be installing the
globus-connect-server
package for your Linux distribution. Follow the
instructions from Globus Connect Server installation guide Section
3.1.
Now that packages are installed, you are ready for initial configuration!