*** Welcome to piglix ***

GLite

gLite
GLite logo.png
Developer(s) EGEE
Stable release
3.2 / 23 March 2009
Operating system Scientific Linux 3, 4 ,5
Type Grid computing
License EGEE Collaboration 2004
Website glite.cern.ch

gLite (pronounced "gee-lite") is a middleware computer software project for grid computing used by the CERN LHC experiments and other scientific domains. It was implemented by collaborative efforts of more than 80 people in 12 different academic and industrial research centers in Europe. gLite provides a framework for building applications tapping into distributed computing and storage resources across the Internet. The gLite services were adopted by more than 250 computing centres and used by more than 15000 researchers in Europe and around the world.

After prototyping phases in 2004 and 2005, convergence with the LHC Computing Grid (LCG-2) distribution was reached in May 2006 when gLite 3.0 was released and became the official middleware of the Enabling Grids for E-sciencE (EGEE) project which ended in 2010.

Development of the gLite middleware was then taken over by the European Middleware Initiative, and is now maintained as part of the EMI software stack.

The distributed computing infrastructure built by EGEE is now supported by the European Grid Infrastructure and runs the Grid middleware produced by the European Middleware Initiative, many components of which came from the gLite middleware.

The gLite user community is grouped into Virtual Organisations (VOs). A user must join a VO supported by the infrastructure running gLite to be authenticated and authorized to using grid resources.

The Grid Security Infrastructure (GSI) in WLCG/EGEE enables secure authentication and communication over an open network. GSI is based on public key encryption, X.509 certificates, and the Secure Sockets Layer (SSL) communication protocol, with extensions for single sign-on and delegation.

To authenticate himself, a user needs to have a digital X.509 certificate issued by a Certification Authority (CA) trusted by the infrastructure running the middleware.

The authorisation of a user on a specific Grid resource can be done in two different ways. The first is simpler, and relies on the grid-mapfile mechanism. The second way relies on the Virtual Organisation Membership Service (VOMS) and the LCAS/LCMAPS mechanism, which allow for a more detailed definition of user privileges.


...
Wikipedia

...