@@ -7,31 +7,37 @@ The computational resources of IT4I are allocated by the Allocation Committee
...
@@ -7,31 +7,37 @@ The computational resources of IT4I are allocated by the Allocation Committee


!!! Note
!!! Note "Note"
You need to either [become the PI](../applying-for-resources/) or [be named as a collaborator](obtaining-login-credentials/#authorization-of-collaborator-by-pi) by a PI in order to access and use the clusters.
You need to either [become the PI](../applying-for-resources/) or [be named as a collaborator](obtaining-login-credentials/#authorization-of-collaborator-by-pi) by a PI in order to access and use the clusters.
Head of Supercomputing Services acts as a PI of a project DD-13-5. Joining this project, you may **access and explore the clusters**, use software, development environment and computers via the qexp and qfree queues. You may use these resources for own education/research, no paperwork is required. All IT4I employees may contact the Head of Supercomputing Services in order to obtain **free access to the clusters**.
Head of Supercomputing Services acts as a PI of a project DD-13-5. Joining this project, you may **access and explore the clusters**, use software, development environment and computers via the qexp and qfree queues. You may use these resources for own education/research, no paperwork is required. All IT4I employees may contact the Head of Supercomputing Services in order to obtain **free access to the clusters**.
### Authorization of PI by Allocation Committee
Authorization of PI by Allocation Committee
-------------------------------------------
The PI is authorized to use the clusters by the allocation decision issued by the Allocation Committee.The PI will be informed by IT4I about the Allocation Committee decision.
The PI is authorized to use the clusters by the allocation decision issued by the Allocation Committee.The PI will be informed by IT4I about the Allocation Committee decision.
### Authorization by web
Authorization by web
--------------------
!!! Note "Note"
**Only** for those who already have their IT4I HPC account. This is a preferred way of granting access to project resources. Please, use this method whenever it's possible.
This is a preferred way of granting access to project resources. Please, use this method whenever it's possible.
This is a preferred way of granting access to project resources. Please, use this method whenever it's possible.
Log in to the [IT4I Extranet portal](https://extranet.it4i.cz) using IT4I credentials and go to the **Projects** section.
Log in to the [IT4I Extranet portal](https://extranet.it4i.cz) using IT4I credentials and go to the **Projects** section.
-**Users:** Please, submit your requests for becoming a project member.
-**Users:** Please, submit your requests for becoming a project member.
-**Primary Investigators:** Please, approve or deny users' requests in the same section.
-**Primary Investigators:** Please, approve or deny users' requests in the same section.
### Authorization by e-mail (an alternative approach)
Authorization by e-mail (an alternative approach)
-------------------------------------------------
In order to authorize a Collaborator to utilize the allocated resources, the PI should contact the [IT4I support](https://support.it4i.cz/rt/)(E-mail:[support[at]it4i.cz](mailto:support%20%5Bat%5D%20it4i.cz)) and provide following information:
In order to authorize a Collaborator to utilize the allocated resources, the PI should contact the [IT4I support](https://support.it4i.cz/rt/)(E-mail:[support[at]it4i.cz](mailto:support@it4i.cz)) and provide following information:
1.Identify your project by project ID
1. Identify your project by project ID
2.Provide list of people, including himself, who are authorized to use the resources allocated to the project. The list must include full name, e-mail and affiliation. Provide usernames as well, if collaborator login access already exists on the IT4I systems.
2. Provide list of people, including himself, who are authorized to use the resources allocated to the project. The list must include full name, e-mail and affiliation. Provide usernames as well, if collaborator login access already exists on the IT4I systems.
3.Include "Authorization to IT4Innovations" into the subject line.
3. Include "Authorization to IT4Innovations" into the subject line.
Example (except the subject line which must be in English, you may use Czech or Slovak language for communication with us):
Example (except the subject line which must be in English, you may use Czech or Slovak language for communication with us):
...
@@ -54,16 +60,16 @@ Example (except the subject line which must be in English, you may use Czech or
...
@@ -54,16 +60,16 @@ Example (except the subject line which must be in English, you may use Czech or
Should the above information be provided by e-mail, the e-mail **must be** digitally signed. Read more on [digital signatures](obtaining-login-credentials/#the-certificates-for-digital-signatures) below.
Should the above information be provided by e-mail, the e-mail **must be** digitally signed. Read more on [digital signatures](obtaining-login-credentials/#the-certificates-for-digital-signatures) below.
The Login Credentials
The Login Credentials
-------------------------
---------------------
Once authorized by PI, every person (PI or Collaborator) wishing to access the clusters, should contact the [IT4I support](https://support.it4i.cz/rt/)(E-mail:[support [at] it4i.cz](mailto:support%20%5Bat%5D%20it4i.cz)) providing following information:
Once authorized by PI, every person (PI or Collaborator) wishing to access the clusters, should contact the [IT4I support](https://support.it4i.cz/rt/)(E-mail:[support[at]it4i.cz](mailto:support@it4i.cz)) providing following information:
1. Project ID
1. Project ID
2. Full name and affiliation
2. Full name and affiliation
3. Statement that you have read and accepted the [Acceptable use policy document](http://www.it4i.cz/acceptable-use-policy.pdf)(AUP).
3. Statement that you have read and accepted the [Acceptable use policy document](http://www.it4i.cz/acceptable-use-policy.pdf)(AUP).
4. Attach the AUP file.
4. Attach the AUP file.
5. Your preferred username, max 8 characters long. The preferred username must associate your surname and name or be otherwise derived from it. Only alphanumeric sequences, dash and underscore signs are allowed.
5. Your preferred username, max 8 characters long. The preferred username must associate your surname and name or be otherwise derived from it. Only alphanumeric sequences, dash and underscore signs are allowed.
6. In case you choose [Alternative way to personal certificate](obtaining-login-credentials/#alternative-way-of-getting-personal-certificate),
6. In case you choose [Alternative way to personal certificate](obtaining-login-credentials/#alternative-way-of-getting-personal-certificate), a **scan of photo ID** (personal ID or passport or driver license) is required
a **scan of photo ID** (personal ID or passport or driver license) is required
Example (except the subject line which must be in English, you may use Czech or Slovak language for communication with us):
Example (except the subject line which must be in English, you may use Czech or Slovak language for communication with us):
...
@@ -99,7 +105,8 @@ You will receive your personal login credentials by protected e-mail. The login
...
@@ -99,7 +105,8 @@ You will receive your personal login credentials by protected e-mail. The login
The clusters are accessed by the [private key](../accessing-the-clusters/shell-access-and-data-transfer/ssh-keys/) and username. Username and password is used for login to the information systems listed on <http://support.it4i.cz/>.
The clusters are accessed by the [private key](../accessing-the-clusters/shell-access-and-data-transfer/ssh-keys/) and username. Username and password is used for login to the information systems listed on <http://support.it4i.cz/>.
### Change Passphrase
Change Passphrase
-----------------
On Linux, use
On Linux, use
...
@@ -109,22 +116,25 @@ local $ ssh-keygen -f id_rsa -p
...
@@ -109,22 +116,25 @@ local $ ssh-keygen -f id_rsa -p
On Windows, use [PuTTY Key Generator](../accessing-the-clusters/shell-access-and-data-transfer/puttygen/).
On Windows, use [PuTTY Key Generator](../accessing-the-clusters/shell-access-and-data-transfer/puttygen/).
### Change Password
Change Password
---------------
Change password in your user profile at <https://extranet.it4i.cz/user/>
Change password in your user profile at <https://extranet.it4i.cz/user/>
The Certificates for Digital Signatures
The Certificates for Digital Signatures
-------------------------------------------
---------------------------------------
We accept personal certificates issued by any widely respected certification authority (CA). This includes certificates by CAs organized in International Grid Trust Federation (<http://www.igtf.net/>), its European branch EUGridPMA - <https://www.eugridpma.org/> and its member organizations, e.g. the CESNET certification authority - <https://tcs-p.cesnet.cz/confusa/>. The Czech *"Qualified certificate" (Kvalifikovaný certifikát)* (provided by <http://www.postsignum.cz/> or <http://www.ica.cz/Kvalifikovany-certifikat.aspx>), that is used in electronic contact with Czech authorities is accepted as well.
We accept personal certificates issued by any widely respected certification authority (CA). This includes certificates by CAs organized in International Grid Trust Federation (<http://www.igtf.net/>), its European branch EUGridPMA - <https://www.eugridpma.org/> and its member organizations, e.g. the CESNET certification authority - <https://tcs-p.cesnet.cz/confusa/>. The Czech *"Qualified certificate" (Kvalifikovaný certifikát)* (provided by <http://www.postsignum.cz/> or <http://www.ica.cz/Kvalifikovany-certifikat.aspx>), that is used in electronic contact with Czech authorities is accepted as well.
Certificate generation process is well-described here:
Certificate generation process is well-described here:
-[How to generate a personal TCS certificate in Mozilla Firefox web browser (in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/moz-cert-gen)
-[How to generate a personal TCS certificate in Mozilla Firefox web browser (in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/moz-cert-gen)
A FAQ about certificates can be found here: [Certificates FAQ](certificates-faq/).
A FAQ about certificates can be found here: [Certificates FAQ](certificates-faq/).
Alternative Way to Personal Certificate
Alternative Way to Personal Certificate
-------------------------------------------
---------------------------------------
Follow these steps **only** if you can not obtain your certificate in a standard way. In case you choose this procedure, please attach a **scan of photo ID** (personal ID or passport or drivers license) when applying for [login credentials](obtaining-login-credentials/#the-login-credentials).
Follow these steps **only** if you can not obtain your certificate in a standard way. In case you choose this procedure, please attach a **scan of photo ID** (personal ID or passport or drivers license) when applying for [login credentials](obtaining-login-credentials/#the-login-credentials).
1. Go to <https://www.cacert.org/>.
1. Go to <https://www.cacert.org/>.
...
@@ -143,8 +153,8 @@ Follow these steps **only** if you can not obtain your certificate in a standard
...
@@ -143,8 +153,8 @@ Follow these steps **only** if you can not obtain your certificate in a standard
Installation of the Certificate Into Your Mail Client
Installation of the Certificate Into Your Mail Client
-[How to Remove, Import, and Export Digital certificates](http://support.microsoft.com/kb/179380)
-[How to Remove, Import, and Export Digital certificates](http://support.microsoft.com/kb/179380)
-[Importing a PKCS #12 certificate (in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/outl-cert-imp)
-[Importing a PKCS #12 certificate (in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/outl-cert-imp)
...
@@ -154,6 +164,7 @@ The procedure is similar to the following guides:
...
@@ -154,6 +164,7 @@ The procedure is similar to the following guides:
End of User Account Lifecycle
End of User Account Lifecycle
-----------------------------
-----------------------------
User accounts are supported by membership in active Project(s) or by affiliation to IT4Innovations. User accounts, that loose the support (meaning, are not attached to an active project and are not affiliated with IT4I), will be deleted 1 year after the last project to which they were attached expires.
User accounts are supported by membership in active Project(s) or by affiliation to IT4Innovations. User accounts, that loose the support (meaning, are not attached to an active project and are not affiliated with IT4I), will be deleted 1 year after the last project to which they were attached expires.
User will get 3 automatically generated warning e-mail messages of the pending removal:.
User will get 3 automatically generated warning e-mail messages of the pending removal:.
...
@@ -162,4 +173,4 @@ User will get 3 automatically generated warning e-mail messages of the pending r
...
@@ -162,4 +173,4 @@ User will get 3 automatically generated warning e-mail messages of the pending r
- Second message will be sent 1 month before the removal
- Second message will be sent 1 month before the removal
- Third message will be sent 1 week before the removal.
- Third message will be sent 1 week before the removal.
The messages will inform about the projected removal date and will challenge the user to migrate her/his data
The messages will inform about the projected removal date and will challenge the user to migrate her/his data