Skip to content
Snippets Groups Projects
Commit 127c2530 authored by Lukáš Krupčík's avatar Lukáš Krupčík
Browse files

change

parent bd9a399e
No related branches found
No related tags found
4 merge requests!368Update prace.md to document the change from qprace to qprod as the default...,!367Update prace.md to document the change from qprace to qprod as the default...,!366Update prace.md to document the change from qprace to qprod as the default...,!323extended-acls-storage-section
Pipeline #
Showing
with 81 additions and 35 deletions
Cygwin and X11 forwarding
=========================
### If no able to forward X11 using PuTTY to CygwinX
**If no able to forward X11 using PuTTY to CygwinX**
```bash
[usename@login1.anselm ~]$ gnome-session &
......
......@@ -3,12 +3,14 @@ Graphical User Interface
X Window System
---------------
The X Window system is a principal way to get GUI access to the clusters.
Read more about configuring [**X Window System**](x-window-system/).
VNC
---
The **Virtual Network Computing** (**VNC**) is a graphical [desktop sharing](http://en.wikipedia.org/wiki/Desktop_sharing "Desktop sharing") system that uses the [Remote Frame Buffer protocol (RFB)](http://en.wikipedia.org/wiki/RFB_protocol "RFB protocol") to remotely control another [computer](http://en.wikipedia.org/wiki/Computer "Computer").
Read more about configuring **[VNC](vnc/)**.
......
......@@ -3,10 +3,11 @@ VNC
The **Virtual Network Computing** (**VNC**) is a graphical [desktop sharing](http://en.wikipedia.org/wiki/Desktop_sharing "Desktop sharing") system that uses the [Remote Frame Buffer protocol (RFB)](http://en.wikipedia.org/wiki/RFB_protocol "RFB protocol") to remotely control another [computer](http://en.wikipedia.org/wiki/Computer "Computer"). It transmits the [keyboard](http://en.wikipedia.org/wiki/Computer_keyboard "Computer keyboard") and [mouse](http://en.wikipedia.org/wiki/Computer_mouse") events from one computer to another, relaying the graphical [screen](http://en.wikipedia.org/wiki/Computer_screen "Computer screen") updates back in the other direction, over a [network](http://en.wikipedia.org/wiki/Computer_network "Computer network").
The recommended clients are [TightVNC](http://www.tightvnc.com) or[TigerVNC](http://sourceforge.net/apps/mediawiki/tigervnc/index.php?title=Main_Page) (free, open source, available for almost any platform).
The recommended clients are [TightVNC](http://www.tightvnc.com) or [TigerVNC](http://sourceforge.net/apps/mediawiki/tigervnc/index.php?title=Main_Page) (free, open source, available for almost any platform).
Create VNC password
-------------------
!!! Note "Note"
Local VNC password should be set before the first login. Do use a strong password.
......@@ -67,7 +68,8 @@ To access the VNC server you have to create a tunnel between the login node usin
!!! Note "Note"
The tunnel must point to the same login node where you launched the VNC server, eg. login2. If you use just cluster-name.it4i.cz, the tunnel might point to a different node due to DNS round robin.
###Linux/Mac OS example of creating a tunnel
Linux/Mac OS example of creating a tunnel
-----------------------------------------
At your machine, create the tunnel:
......@@ -106,7 +108,8 @@ You have to destroy the SSH tunnel which is still running at the background afte
kill 2022
```
### Windows example of creating a tunnel
Windows example of creating a tunnel
------------------------------------
Use PuTTY to log in on cluster.
......@@ -129,13 +132,15 @@ Fill the Source port and Destination fields. **Do not forget to click the Add bu
Run the VNC client of your choice, select VNC server 127.0.0.1, port 5961 and connect using VNC password.
### Example of starting TigerVNC viewer
Example of starting TigerVNC viewer
-----------------------------------
![](../../../img/vncviewer.png)
In this example, we connect to VNC server on port 5961, via the ssh tunnel, using TigerVNC viewer. The connection is encrypted and secured. The VNC server listening on port 5961 provides screen of 1600x900 pixels.
### Example of starting TightVNC Viewer
Example of starting TightVNC Viewer
-----------------------------------
Use your VNC password to log using TightVNC Viewer and start a Gnome Session on the login node.
......@@ -148,7 +153,8 @@ You should see after the successful login.
![](../../../img/gnome_screen.png)
###Disable your Gnome session screensaver
Disable your Gnome session screensaver
--------------------------------------
Open Screensaver preferences dialog:
......@@ -158,7 +164,8 @@ Uncheck both options below the slider:
![](../../../img/gdmdisablescreensaver.png)
### Kill screensaver if locked screen
Kill screensaver if locked screen
---------------------------------
If the screen gets locked you have to kill the screensaver. Do not to forget to disable the screensaver then.
......@@ -170,7 +177,8 @@ username     24316  0.0  0.0 270564  3528 ?        Ss   14:12 
[username@login2 .vnc]$ kill 24316
```
### Kill vncserver after finished work
Kill vncserver after finished work
----------------------------------
You should kill your VNC server using command:
......@@ -188,6 +196,7 @@ Or this way:
GUI applications on compute nodes over VNC
------------------------------------------
The very same methods as described above, may be used to run the GUI applications on compute nodes. However, for maximum performance, proceed following these steps:
Open a Terminal (Applications -> System Tools -> Terminal). Run all the next commands in the terminal.
......
......@@ -6,7 +6,8 @@ The X Window system is a principal way to get GUI access to the clusters. The **
!!! Note "Note"
The X display forwarding must be activated and the X server running on client side
### X display
X display
---------
In order to display graphical user interface GUI of various software tools, you need to enable the X display forwarding. On Linux and Mac, log in using the -X option tho ssh client:
......@@ -14,7 +15,8 @@ In order to display graphical user interface GUI of various software tools, you
local $ ssh -X username@cluster-name.it4i.cz
```
### X Display Forwarding on Windows
X Display Forwarding on Windows
-------------------------------
On Windows use the PuTTY client to enable X11 forwarding. In PuTTY menu, go to Connection->SSH->X11, mark the Enable X11 forwarding checkbox before logging in. Then log in as usual.
......@@ -32,15 +34,18 @@ localhost:10.0
then the X11 forwarding is enabled.
### X Server
X Server
--------
In order to display graphical user interface GUI of various software tools, you need running X server on your desktop computer. For Linux users, no action is required as the X server is the default GUI environment on most Linux distributions. Mac and Windows users need to install and run the X server on their workstations.
### X Server on OS X
X Server on OS X
----------------
Mac OS users need to install [XQuartz server](http://xquartz.macosforge.org/landing/).
### X Server on Windows
X Server on Windows
-------------------
There are variety of X servers available for Windows environment. The commercial Xwin32 is very stable and rich featured. The Cygwin environment provides fully featured open-source XWin X server. For simplicity, we recommend open-source X server by the [Xming project](http://sourceforge.net/projects/xming/). For stability and full features we recommend the
[XWin](http://x.cygwin.com/) X server by Cygwin
......@@ -51,7 +56,8 @@ There are variety of X servers available for Windows environment. The commercial
Read more on [http://www.math.umn.edu/systems_guide/putty_xwin32.html](http://www.math.umn.edu/systems_guide/putty_xwin32.shtml)
### Running GUI Enabled Applications
Running GUI Enabled Applications
--------------------------------
!!! Note "Note"
Make sure that X forwarding is activated and the X server is running.
......@@ -69,7 +75,8 @@ $ xterm
In this example, we activate the intel programing environment tools, then start the graphical gvim editor.
### GUI Applications on Compute Nodes
GUI Applications on Compute Nodes
---------------------------------
Allocate the compute nodes using -X option on the qsub command
......@@ -87,11 +94,13 @@ $ ssh -X r24u35n680
In this example, we log in on the r24u35n680 compute node, with the X11 forwarding enabled.
### The Gnome GUI Environment
The Gnome GUI Environment
-------------------------
The Gnome 2.28 GUI environment is available on the clusters. We recommend to use separate X server window for displaying the Gnome environment.
### Gnome on Linux and OS X
Gnome on Linux and OS X
-----------------------
To run the remote Gnome session in a window on Linux/OS X computer, you need to install Xephyr. Ubuntu package is
xserver-xephyr, on OS X it is part of [XQuartz](http://xquartz.macosforge.org/landing/). First, launch Xephyr on local machine:
......@@ -117,7 +126,8 @@ xinit /usr/bin/ssh -XT -i .ssh/path_to_your_key yourname@cluster-namen.it4i.cz g
However this method does not seem to work with recent Linux distributions and you will need to manually source
/etc/profile to properly set environment variables for PBS.
### Gnome on Windows
Gnome on Windows
----------------
Use Xlaunch to start the Xming server or run the XWin.exe. Select the "One window" mode.
......
......@@ -6,11 +6,13 @@ The IT4Innovations clusters are accessed by SSH protocol via login nodes.
!!! Note "Note"
Read more on [Accessing the Salomon Cluster](../../salomon/accessing-the-cluster/accessing-the-cluster/)r or [Accessing the Anselm Cluster](../../anselm-cluster-documentation/accessing-the-cluster/shell-and-data-access/) pages.
### PuTTY
PuTTY
-----
On **Windows**, use [PuTTY ssh client](shell-access-and-data-transfer/putty/).
### SSH keys
SSH keys
--------
Read more about [SSH keys management](shell-access-and-data-transfer/ssh-keys/).
PuTTY
=====
PuTTY - before we start SSH connection
---------------------------------------------------------------------------------
!!! Note "Note"
PuTTY - before we start SSH connection
### Windows PuTTY Installer
Windows PuTTY Installer
-----------------------
We recommned you to download "**A Windows installer for everything except PuTTYtel**" with **Pageant** (SSH authentication agent) and **PuTTYgen** (PuTTY key generator) which is available [here](http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html).
......@@ -17,16 +18,18 @@ We recommned you to download "**A Windows installer for everything except PuTTYt
"Pageant" is optional.
### PuTTYgen
PuTTYgen
--------
PuTTYgen is the PuTTY key generator. Read more how to load in an existing private key and change your passphrase or generate a new public/private key pair using [PuTTYgen](puttygen) if needed.
### Pageant SSH agent
Pageant SSH agent
-----------------
[Pageant](pageant) holds your private key in memory without needing to retype a passphrase on every login. We recommend its usage.
PuTTY - how to connect to the IT4Innovations cluster
--------------------------------------------------------
----------------------------------------------------
- Run PuTTY
- Enter Host name and Save session fields with [Login address](../../../salomon/accessing-the-cluster/accessing-the-cluster/) and browse Connection - > SSH -> Auth menu. The *Host Name* input may be in the format **"username@clustername.it4i.cz"** so you don't have to type your login each time.In this example we will connect to the Salomon cluster using **"salomon.it4i.cz"**.
......
......@@ -7,7 +7,7 @@ PuTTYgen is the PuTTY key generator. You can load in an existing private key and
You can change the password of your SSH key with "PuTTY Key Generator". Make sure to backup the key.
- Load your [private key](../shell-access-and-data-transfer/ssh-keys/) file with *Load* button.
- Load your [private key](../shell-access-and-data-transfer/ssh-keys/) file with *Load* button.
- Enter your current passphrase.
- Change key passphrase.
- Confirm key passphrase.
......@@ -15,7 +15,8 @@ You can change the password of your SSH key with "PuTTY Key Generator". Make sur
![](../../../img/PuttyKeygeneratorV.png)
### Generate a New Public/Private key
Generate a New Public/Private key
---------------------------------
You can generate an additional public/private key pair and insert public key into authorized_keys file for authentication with your own private key.
......
......@@ -2,7 +2,8 @@ SSH keys
========
Key management
-------------------------------------------------------------------
--------------
After logging in, you can see .ssh/ directory with SSH keys and authorized_keys file:
```bash
......@@ -20,7 +21,8 @@ After logging in, you can see .ssh/ directory with SSH keys and authorized_keys
!!! Note "Note"
Please note that private keys in .ssh directory are without passphrase and allow you to connect within the cluster.
### Access privileges on .ssh folder
Access privileges on .ssh folder
--------------------------------
- .ssh directory: 700 (drwx------)
- Authorized_keys, known_hosts and public key (.pub file): 644 (-rw-r--r--)
......@@ -38,6 +40,7 @@ After logging in, you can see .ssh/ directory with SSH keys and authorized_keys
Private key
-----------
!!! Note "Note"
The path to a private key is usually /home/username/.ssh/
......@@ -86,7 +89,8 @@ An example of public key format:
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCpujuOiTKCcGkbbBhrk0Hjmezr5QpM0swscXQE7fOZG0oQSURoapd9tjC9eVy5FvZ339jl1WkJkdXSRtjc2G1U5wQh77VE5qJT0ESxQCEw0S+CItWBKqXhC9E7gFY+UyP5YBZcOneh6gGHyCVfK6H215vzKr3x+/WvWl5gZGtbf+zhX6o4RJDRdjZPutYJhEsg/qtMxcCtMjfm/dZTnXeafuebV8nug3RCBUflvRb1XUrJuiX28gsd4xfG/P6L/mNMR8s4kmJEZhlhxpj8Th0iIc+XciVtXuGWQrbddcVRLxAmvkYAPGnVVOQeNj69pqAR/GXaFAhvjYkseEowQao1 username@organization.example.com
```
### How to add your own key
How to add your own key
-----------------------
First, generate a new keypair of your public and private key:
......@@ -107,6 +111,7 @@ Example:
In this example, we add an additional public key, stored in file additional_key.pub into the authorized_keys. Next time we log in, we will be able to use the private addtional_key key to log in.
### How to remove your own key
How to remove your own key
--------------------------
Removing your key from authorized_keys can be done simply by deleting the corresponding public key which can be identified by a comment at the end of line (eg. username@organization.example.com).
Removing your key from authorized_keys can be done simply by deleting the corresponding public key which can be identified by a comment at the end of line (eg. *username@organization.example.com*).
......@@ -15,28 +15,33 @@ There are different kinds of certificates, each with a different scope of use. W
- Host certificates
- Service certificates
**However, users need only manage User and CA certificates. Note that your user certificate is protected by an associated private key, and this private key must never be disclosed**.
However, users need only manage User and CA certificates. Note that your user certificate is protected by an associated private key, and this **private key must never be disclosed**.
Q: Which X.509 certificates are recognised by IT4Innovations?
-------------------------------------------------------------
Any certificate that has been issued by a Certification Authority (CA) from a member of the IGTF ([http:www.igtf.net](http://www.igtf.net/)) is recognised by IT4Innovations: European certificates are issued by members of the EUGridPMA ([https://www.eugridmpa.org](https://www.eugridpma.org/)), which is part if the IGTF and coordinates the trust fabric for e-Science Grid authentication within Europe. Further the Czech *"Qualified certificate" (Kvalifikovaný certifikát)* (provided by <http://www.postsignum.cz/> or <http://www.ica.cz/Kvalifikovany-certifikat.aspx>), that is used in electronic contact with Czech public authorities is accepted.
Q: How do I get a User Certificate that can be used with IT4Innovations?
------------------------------------------------------------------------
To get a certificate, you must make a request to your local, IGTF approved, Certificate Authority (CA). Usually you then must visit, in person, your nearest Registration Authority (RA) to verify your affiliation and identity (photo identification is required). Usually, you will then be emailed details on how to retrieve your certificate, although procedures can vary between CAs. If you are in Europe, you can locate your trusted CA via <http://www.eugridpma.org/members/worldmap>.
In some countries certificates can also be retrieved using the TERENA Certificate Service, see the FAQ below for the link.
Q: Does IT4Innovations support short lived certificates (SLCS)?
---------------------------------------------------------------
Yes, provided that the CA which provides this service is also a member of IGTF.
Q: Does IT4Innovations support the TERENA certificate service?
--------------------------------------------------------------
Yes, ITInnovations supports TERENA eScience personal certificates. For more information, please visit [https://tcs-escience-portal.terena.org](https://tcs-escience-portal.terena.org/), where you also can find if your organisation/country can use this service
Q: What format should my certificate take?
------------------------------------------
User Certificates come in many formats, the three most common being the ’PKCS12’, ’PEM’ and the JKS formats.
The PKCS12 (often abbreviated to ’p12’) format stores your user certificate, along with your associated private key, in a single file. This form of your certificate is typically employed by web browsers, mail clients, and grid services like UNICORE, DART, gsissh-term and Globus toolkit (GSI-SSH, GridFTP and GRAM5).
......@@ -51,6 +56,7 @@ To convert your Certificate from p12 to JKS, IT4Innovations recommends using the
Q: What are CA certificates?
----------------------------
Certification Authority (CA) certificates are used to verify the link between your user certificate and the authority which issued it. They are also used to verify the link between the host certificate of a IT4Innovations server and the CA which issued that certificate. In essence they establish a chain of trust between you and the target server. Thus, for some grid services, users must have a copy of all the CA certificates.
To assist users, SURFsara (a member of PRACE) provides a complete and up-to-date bundle of all the CA certificates that any PRACE user (or IT4Innovations grid services user) will require. Bundle of certificates, in either p12, PEM or JKS formats, are available from <http://winnetou.sara.nl/prace/certs/>.
......@@ -67,6 +73,7 @@ If you run this command as ’root’, then it will install the certificates int
Q: What is a DN and how do I find mine?
---------------------------------------
DN stands for Distinguished Name and is part of your user certificate. IT4Innovations needs to know your DN to enable your account to use the grid services. You may use openssl (see below) to determine your DN or, if your browser contains your user certificate, you can extract your DN from your browser.
For Internet Explorer users, the DN is referred to as the "subject" of your certificate. Tools-&gt;Internet Options-&gt;Content-&gt;Certificates-&gt;View-&gt;Details-&gt;Subject.
......@@ -75,6 +82,7 @@ For users running Firefox under Windows, the DN is referred to as the "subject"
Q: How do I use the openssl tool?
---------------------------------
The following examples are for Unix/Linux operating systems only.
To convert from PEM to p12, enter the following command:
......@@ -110,6 +118,7 @@ To download openssl for both Linux and Windows, please visit <http://www.openssl
Q: How do I create and then manage a keystore?
----------------------------------------------
IT4innovations recommends the java based keytool utility to create and manage keystores, which themselves are stores of keys and certificates. For example if you want to convert your pkcs12 formatted key pair into a java keystore you can use the following command.
```bash
......@@ -132,6 +141,7 @@ More information on the tool can be found at:<http://docs.oracle.com/javase/7/do
Q: How do I use my certificate to access the different grid Services?
---------------------------------------------------------------------
Most grid services require the use of your certificate; however, the format of your certificate depends on the grid Service you wish to employ.
If employing the PRACE version of GSISSH-term (also a Java Web Start Application), you may use either the PEM or p12 formats. Note that this service automatically installs up-to-date PRACE CA certificates.
......@@ -142,6 +152,7 @@ If the grid service is part of Globus, such as GSI-SSH, GriFTP or GRAM5, then th
Q: How do I manually import my certificate into my browser?
-----------------------------------------------------------
If you employ the Firefox browser, then you can import your certificate by first choosing the "Preferences" window. For Windows, this is Tools-&gt;Options. For Linux, this is Edit-&gt;Preferences. For Mac, this is Firefox-&gt;Preferences. Then, choose the "Advanced" button; followed by the "Encryption" tab. Then, choose the "Certificates" panel; select the option "Select one automatically" if you have only one certificate, or "Ask me every time" if you have more then one. Then click on the "View Certificates" button to open the "Certificate Manager" window. You can then select the "Your Certificates" tab and click on button "Import". Then locate the PKCS12 (.p12) certificate you wish to import, and employ its associated password.
If you are a Safari user, then simply open the "Keychain Access" application and follow "File-&gt;Import items".
......@@ -150,12 +161,15 @@ If you are an Internet Explorer user, click Start-&gt;Settings-&gt;Control Panel
Q: What is a proxy certificate?
-------------------------------
A proxy certificate is a short-lived certificate which may be employed by UNICORE and the Globus services. The proxy certificate consists of a new user certificate and a newly generated proxy private key. This proxy typically has a rather short lifetime (normally 12 hours) and often only allows a limited delegation of rights. Its default location, for Unix/Linux, is /tmp/x509_u*uid* but can be set via the $X509_USER_PROXY environment variable.
Q: What is the MyProxy service?
-------------------------------
[The MyProxy Service](http://grid.ncsa.illinois.edu/myproxy/) , can be employed by gsissh-term and Globus tools, and is an online repository that allows users to store long lived proxy certificates remotely, which can then be retrieved for use at a later date. Each proxy is protected by a password provided by the user at the time of storage. This is beneficial to Globus users as they do not have to carry their private keys and certificates when travelling; nor do users have to install private keys and certificates on possibly insecure computers.
Q: Someone may have copied or had access to the private key of my certificate either in a separate file or in the browser. What should I do?
--------------------------------------------------------------------------------------------------------------------------------------------
Please ask the CA that issued your certificate to revoke this certifcate and to supply you with a new one. In addition, please report this to IT4Innovations by contacting [the support team](https://support.it4i.cz/rt).
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment