After you have configure single sign-on through the OAuth 2.0 protocol and integrated
Keycloak with LDAP or Active Directory, your final step is to authenticate and test your OAuth
single sign-on connection.
Procedure
- Log on to LSF Web Services
through your single sign-on realm account. Use the username and password created for the realm that you created in
Keycloak (for example,
lsfadmin
):
# lsf cluster logon --username SSO_user --password password --url https://LWS_proxy_hostname_or_IP_address:port
For example:
# lsf cluster logon --username lsfadmin --password xxxxxx --url https://LWS_proxy_hostname_or_IP_address:8448
- List the logged clusters:
For example:
#lsf cluster list
Default Name Version URL
* lws_ha IBM Spectrum LSF Standard 10.1.0.14, Jun 11 2023 https://lwshost.ibm.com:8448
- Submit jobs to the LSF
cluster.
For example:
#lsf bsub sleep 20
Job <364> is submitted to default queue <normal>.
#lsf bjobs -a
JOBID USER STAT QUEUE FROM_HOST EXEC_HOST JOB_NAME SUBMIT_TIME
364 lsfadmin DONE normal lwshost lwsexec sleep 20 May 25 05:46