Open Access
| Issue |
EPJ Web Conf.
Volume 337, 2025
27th International Conference on Computing in High Energy and Nuclear Physics (CHEP 2024)
|
|
|---|---|---|
| Article Number | 01080 | |
| Number of page(s) | 6 | |
| DOI | https://doi.org/10.1051/epjconf/202533701080 | |
| Published online | 07 October 2025 | |
- Brillault, Vincent et al, “WLCG Traceability and Isolation WG: recommendations”, https://indico.cern.ch/event/739880/contributions/3470862/attachments/1876966/3093414/WLCG_Traceability_and_Isolation_WG recommendations.pdf (Accessed Feb 2025) [Google Scholar]
- Ceccanti, Andrea, Vianello, Enrico Caberletti, Marco and Giacomini, Francesco, “Beyond X.509: token-based authentication and authorization for HEP”, EPJ Web Conf. Volume 214 (CHEP 2018) https://doi.org/10.1051/epjconf/201921409002 [Google Scholar]
- Brian Bockelman, Andrea Ceccanti, Ian Collier, Linda Cornwall, Thomas Dack, Jaroslav Guenther, Mario Lassnig, Maarten Litmaath, Paul Millar, Mischa Sallé, Hannah Short, Jeny Teheran and Romain Wartel, “WLCG Authorisation from X.509 to Tokens”, EPJ Web Conf. Volume 245 (CHEP 2019) https://doi.org/10.1051/epjconf/202024503001 [Google Scholar]
- “INDIGO Identity and Access Management Service (IAM)”: https://indigo-iam.github.io (Accessed March 2025) [Google Scholar]
- RCIAM: https://github.com/rciam (Accessed March 2025) [Google Scholar]
- GEANT Core AAI Platform: https://github.com/geant-core-aai (Accessed March 2025) [Google Scholar]
- Unity IDM: https://unity-idm.eu (Accessed March 2025) [Google Scholar]
- Perun AAI Platform: https://perun-aai.org (Accessed March 2025) [Google Scholar]
- Keycloak: https://www.keycloak.org (Accessed March 2025) [Google Scholar]
- CILogon: https://www.cilogon.org/ (Accessed March 2025) [Google Scholar]
- WLCG Common JWT Profiles: https://zenodo.org/records/3460258 (Accessed March 2025) [Google Scholar]
- RFC9068: https://www.rfc-editor.org/rfc/rfc9068.html (Accessed March 2025) [Google Scholar]
- RFC7662: https://www.rfc-editor.org/rfc/rfc7662.html (Accessed March 2025) [Google Scholar]
- Cornwall, Linda, “D4.4 Security Risk Assessment of the EGI Infrastructure” https://documents. egi.eu/public/ShowDocument?docid=863 (Accessed March 2025) [Google Scholar]
- AARC G081 Document: Recommendations for Token Lifetimes https://docs.google.com/document/d/1U9vvJfWuE8oO7u0FcGVGr3KySvBqwjnkzKO8TKzgoX4 (Accessed March 2025). [Google Scholar]
- Token Trust and Traceability WG: https://github.com/TTT-WG/TTT-WG (Accessed March 2025) [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

