Cisco Cisco Workload Automation 6.3 User Guide
10
Configuring the Amazon EC2 Adapter
Securing the Adapter
3.
Place the file in the
C:\Program Files\TIDAL\Scheduler\Master\config
directory.
4.
Restart the master:
Windows:
Click
Start
in the Service Control Manager.
UNIX:
Enter
tesm start
The master will read and apply the license when it starts.
5.
To validate that the license was applied, select
Registered License
from
Activities
main menu.
Securing the Adapter
There are two types of users associated with the Amazon EC2 Adapter,
Runtime Users
and
Schedulers
. You maintain
definitions for both types of users from the
Users
pane.
Runtime Users
Runtime users in the context of EC2 jobs represent those users and passwords required for authentication. EC2
operations require authentication against a valid EC2 user as defined by a EC2 administrator.
operations require authentication against a valid EC2 user as defined by a EC2 administrator.
Schedulers
Schedulers are those users who will define and/or manage EC2 jobs. There are three aspects of a user profile that
grant and/or limit access to scheduling jobs that affect EC2:
grant and/or limit access to scheduling jobs that affect EC2:
—
Security policy that grants or denies add, edit, delete and view capabilities for EC2 jobs.
—
Authorized runtime user list that grants or denies access to specific authentication accounts for use with EC2
jobs.
jobs.
—
Authorized agent list that grants or denies access to specific Amazon EC2 Adapter connections for use when
defining EC2 jobs.
defining EC2 jobs.
About Amazon EC2 Credentials
Access to Amazon EC2 is granted using a certificate and access/secret key pair.
The access and secret keys are unique strings assigned to each customer where their account is created. Both are
needed to authenticate into the EC2 system. The access key is considered public, while only the customer should know
the secret key.
needed to authenticate into the EC2 system. The access key is considered public, while only the customer should know
the secret key.
The Amazon EC2 adapter needs both keys to make a connection to EC2. Since each key-pair uniquely identifies a
particular customer, they can be treated as a user name and password. As such, Cisco Workload Automation users can
be used to store the access and private keys. When defining an EC2 connection, the user must select an existing EC2
user with the desired keys.
particular customer, they can be treated as a user name and password. As such, Cisco Workload Automation users can
be used to store the access and private keys. When defining an EC2 connection, the user must select an existing EC2
user with the desired keys.
Defining Runtime Users
To define a runtime user:
1.
From the
Navigator
pane, expand the
Administration
node and select
Runtime Users
to display the defined
users.
2.
Right-click
Runtime Users
and select
Add Runtime User
from the context menu (Insert mode).