Access control¶ Kerberos to access restricted resources VOMS-proxy to authenticate with a VOMS proxy certificate Rucio to authenticate with a Rucio instance Private Docker registries to access private images