Access control¶ Kerberos to access restricted resources VOMS-proxy to authenticate with a VOMS proxy certificate Private Docker registries to access private images