Authenticating the OAuth single sign-on connection

After you have configure single sign-on through the OAuth 2.0 protocol and integrated Keycloak with LDAP or Active Directory, your final step is to authenticate and test your OAuth single sign-on connection.

Procedure

  1. Log on to LSF Web Services through your single sign-on realm account. Use the username and password created for the realm that you created in Keycloak (for example, lsfadmin):
    # lsf cluster logon --username SSO_user --password password --url https://LWS_proxy_hostname_or_IP_address:port
    For example:
    # lsf cluster logon --username lsfadmin --password xxxxxx --url https://LWS_proxy_hostname_or_IP_address:8448
  2. List the logged clusters:
    For example:
     
    #lsf cluster list 
    Default   Name     Version                                            URL 
    *         lws_ha   IBM Spectrum LSF Standard 10.1.0.14, Jun 11 2023   https://lwshost.ibm.com:8448
  3. Submit jobs to the LSF cluster.
    For example:
    #lsf bsub sleep 20                                                                                   
    Job <364> is submitted to default queue <normal>. 
    
    #lsf bjobs -a     
    JOBID  USER     STAT  QUEUE   FROM_HOST   EXEC_HOST   JOB_NAME   SUBMIT_TIME 
    364    lsfadmin DONE  normal  lwshost     lwsexec     sleep 20   May 25 05:46