Newer
Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
Obtaining Login Credentials
===========================
Obtaining Authorization
-----------------------
The computational resources of IT4I are allocated by the Allocation
Committee to a [Project](../introduction.html),
investigated by a Primary Investigator. By allocating the computational
resources, the Allocation Committee is authorizing the PI to access and
use the clusters. The PI may decide to authorize a number of her/his
Collaborators to access and use the clusters, to consume the resources
allocated to her/his Project. These collaborators will be associated to
the Project. The Figure below is depicting the authorization chain:

You need to either [become the
PI](../applying-for-resources.html) or [be named as a
collaborator](obtaining-login-credentials.html#authorization-of-collaborator-by-pi)
by a PI in order to access and use the clusters.
Head of Supercomputing Services acts as a PI of a project DD-13-5.
Joining this project, you may **access and explore the clusters**, use
software, development environment and computers via the qexp and qfree
queues. You may use these resources for own education/research, no
paperwork is required. All IT4I employees may contact the Head of
Supercomputing Services in order to obtain **free access to the
clusters**.
### Authorization of PI by Allocation Committee
The PI is authorized to use the clusters by the allocation decision
issued by the Allocation Committee.The PI will be informed by IT4I about
the Allocation Committee decision.
### Authorization by web
This is a preferred way of granting access to project resources.
Please, use this method whenever it's possible.
Log in to the [IT4I Extranet
portal](https://extranet.it4i.cz) using IT4I credentials
and go to the **Projects** section.
- **Users:** Please, submit your requests for becoming a
project member.
- **Primary Investigators:** Please, approve or deny users' requests
in the same section.
### Authorization by e-mail (an alternative approach)
In order to authorize a Collaborator to utilize the allocated
resources, the PI should contact the [IT4I
support](https://support.it4i.cz/rt/) (E-mail: [support
[at] it4i.cz](mailto:support%20%5Bat%5D%20it4i.cz)) and provide
following information:
1. Identify your project by project ID
2. Provide list of people, including himself, who are authorized to use
the resources allocated to the project. The list must include full
name, e-mail and affiliation. Provide usernames as well, if
collaborator login access already exists on the IT4I systems.
3. Include "Authorization to IT4Innovations" into the subject line.
Example (except the subject line which must be in English, you may use
Czech or Slovak language for communication with us):
Subject: Authorization to IT4Innovations
Dear support,
Please include my collaborators to project OPEN-0-0.
John Smith, john.smith@myemail.com, Department of Chemistry, MIT, US
Jonas Johansson, jjohansson@otheremail.se, Department of Physics, Royal Institute of Technology, Sweden
Luisa Fibonacci, lf@emailitalia.it, Department of Mathematics, National Research Council, Italy
Thank you,
PI
(Digitally signed)
Should the above information be provided by e-mail, the e-mail **must
be** digitally signed. Read more on [digital
signatures](obtaining-login-credentials.html#the-certificates-for-digital-signatures)
below.
The Login Credentials
-------------------------
Once authorized by PI, every person (PI or Collaborator) wishing to
access the clusters, should contact the [IT4I
support](https://support.it4i.cz/rt/) (E-mail: [support
[at] it4i.cz](mailto:support%20%5Bat%5D%20it4i.cz)) providing
following information:
1. Project ID
2. Full name and affiliation
3. Statement that you have read and accepted the [Acceptable use policy
document](http://www.it4i.cz/acceptable-use-policy.pdf) (AUP).
4. Attach the AUP file.
5. Your preferred username, max 8 characters long. The preferred
username must associate your surname and name or be otherwise
derived from it. Only alphanumeric sequences, dash and underscore
signs are allowed.
6. In case you choose [Alternative way to personal
certificate](obtaining-login-credentials.html#alternative-way-of-getting-personal-certificate),
a **scan of photo ID** (personal ID or passport or driver license)
is required
Example (except the subject line which must be in English, you may use
Czech or Slovak language for communication with us):
Subject: Access to IT4Innovations
Dear support,
Please open the user account for me and attach the account to OPEN-0-0
Name and affiliation: John Smith, john.smith@myemail.com, Department of Chemistry, MIT, US
I have read and accept the Acceptable use policy document (attached)
Preferred username: johnsm
Thank you,
John Smith
(Digitally signed)
Should the above information be provided by e-mail, the e-mail **must
be** digitally signed. To sign an e-mail, you need digital certificate.
Read more on [digital
signatures](obtaining-login-credentials.html#the-certificates-for-digital-signatures)
below.
Digital signature allows us to confirm your identity in remote
electronic communication and provides an encrypted channel to exchange
sensitive information such as login credentials. After receiving your
signed e-mail with the requested information, we will send you your
login credentials (user name, key, passphrase and password) to access
the IT4I systems.
We accept certificates issued by any widely respected certification
authority.
For various reasons we do not accept PGP keys.** Please, use only
X.509 PKI certificates for communication with us.**
You will receive your personal login credentials by protected e-mail.
The login credentials include:
1. username
2. ssh private key and private key passphrase
3. system password
The clusters are accessed by the [private
key](../accessing-the-clusters/shell-access-and-data-transfer/ssh-keys.html)
and username.
Username and password is used for login to the information systems
listed on <http://support.it4i.cz/>.
### Change Passphrase
On Linux, use
`
local $ ssh-keygen -f id_rsa -p
`
On Windows, use [PuTTY Key
Generator](../accessing-the-clusters/shell-access-and-data-transfer/putty/puttygen.html).
### Change Password
Change password in your user profile at
<https://extranet.it4i.cz/user/>
The Certificates for Digital Signatures
-------------------------------------------
We accept personal certificates issued by any widely respected
certification authority (CA). This includes certificates by CAs
organized in International Grid Trust Federation
(<http://www.igtf.net/>), its European branch EUGridPMA -
<https://www.eugridpma.org/> and its member organizations, e.g. the
CESNET certification authority - <https://tcs-p.cesnet.cz/confusa/>. The
Czech *"Qualified certificate" (Kvalifikovaný certifikát)* (provided by
<http://www.postsignum.cz/> or
<http://www.ica.cz/Kvalifikovany-certifikat.aspx>), that is used in
electronic contact with Czech authorities is accepted as well.
Certificate generation process is well-described here:
- [How to generate a personal TCS certificate in Mozilla Firefox web
browser
(in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/moz-cert-gen)
A FAQ about certificates can be found here: >[Certificates
FAQ](certificates-faq.html).
Alternative Way to Personal Certificate
-------------------------------------------
Follow these steps **only** if you can not obtain your certificate in a
standard way.
In case you choose this procedure, please attach a **scan of photo ID**
(personal ID or passport or drivers license) when applying for [login
credentials](obtaining-login-credentials.html#the-login-credentials).
1. Go to <https://www.cacert.org/>.
- If there's a security warning, just acknowledge it.
2. Click *Join*.
3. Fill in the form and submit it by the *Next* button.
- Type in the e-mail address which you use for communication
with us.
- Don't forget your chosen *Pass Phrase*.
4. You will receive an e-mail verification link. Follow it.
5. After verifying, go to the CAcert's homepage and login using
*Password Login*.
6. Go to *Client Certificates* -> *New*.
7. Tick *Add* for your e-mail address and click the *Next* button.
8. Click the *Create Certificate Request* button.
9. You'll be redirected to a page from where you can download/install
your certificate.
- Simultaneously you'll get an e-mail with a link to
the certificate.
Installation of the Certificate Into Your Mail Client
-----------------------------------------------------
The procedure is similar to the following guides:
- MS Outlook 2010
- [How to Remove, Import, and Export Digital
Certificates](http://support.microsoft.com/kb/179380)
- [Importing a PKCS #12 certificate
(in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/outl-cert-imp)
- Mozilla Thudnerbird
- [Installing an SMIME
certificate](http://kb.mozillazine.org/Installing_an_SMIME_certificate)
- [Importing a PKCS #12 certificate
(in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/moz-cert-imp)
End of User Account Lifecycle
-----------------------------
User accounts are supported by membership in active Project(s) or by
affiliation to IT4Innovations. User accounts, that loose the support
(meaning, are not attached to an active project and are not affiliated
with IT4I), will be deleted 1 year after the last project to which they
were attached expires.
User will get 3 automatically generated warning e-mail messages of the
pending removal:.
- First message will be sent 3 months before the removal
- Second message will be sent 1 month before the removal
- Third message will be sent 1 week before the removal.
The messages will inform about the projected removal date and will
challenge the user to migrate her/his data