...wip...
Description
WaTTS activity is to provide token translation functionality. It allows integration of legacy services, such as SSH enabled services and services requiring the use of X.509 certificates, with federated identities. For this, WaTTS accepts federated identities (via OpenID Connect) and uses a plugin scheme to generate credentials for your service. This allows users to access services that support only non-federated authentication mechanisms, using their federated identities. Relying Services can subscribe to the credential translation service of the Life Science AAI provided by WaTTS, allowing the users to obtain X.509 certificates based on their Life Science IDs. WaTTS will provide a trusted credential store connected to the RCauth.eu online CA and through SSH. Additional plugins for common services already exist to support additional legacy services.
WaTTS is developed by INDIGO and operated as a service through EUDAT and KIT.
User Guide
At the following link is available a complete guide related to WaTTS.
https://watts-dev.data.kit.edu/docs/user/index.html
Code Guide
A complete guide related to WaTTS codes and function is available at the following link:
https://watts-dev.data.kit.edu/docs/code/index.html
Plugins
The service has been extended with two plugins, to allow the of OIDC login to access services via ssh and RCauth.
Those two plugins are the results of two separate AARC1 pilots. Both are well documented and described at the following links:
WaTTS SSH plugin: WaTTS SSH plugin - SSH access using OIDC login
WaTTS RCauth plugin: WaTTS RCauth plugin - Obtaining IOTA proxy certificates with OIDC