@@ -17,7 +17,7 @@ In all cases, IT4Innovations’ access mechanisms are aimed at distributing comp
...
@@ -17,7 +17,7 @@ In all cases, IT4Innovations’ access mechanisms are aimed at distributing comp
Once you create an account, log in to the [IT4I Information System][e] and apply for a project.
Once you create an account, log in to the [IT4I Information System][e] and apply for a project.
You will be informed by IT4I about the Allocation Committee decision.
You will be informed by IT4I about the Allocation Committee decision.
Once approved by the Allocation Committee, you become the Primary Investigator (PI) for the project
Once approved by the Allocation Committee, you become the Primary Investigator (PI) for the project
and are authorized to use the clusters and any allocated resources.
and are authorized to use the clusters and any allocated resources as well as authorize collaborators for your project.
## Authorize Collaborators for Your Project
## Authorize Collaborators for Your Project
...
@@ -27,7 +27,8 @@ As a PI, you can approve or deny users' requests to join your project. There are
...
@@ -27,7 +27,8 @@ As a PI, you can approve or deny users' requests to join your project. There are
This is a preferred method if you have an IT4I or e-INFRA CZ account.
This is a preferred method if you have an IT4I or e-INFRA CZ account.
Log in to the [IT4I SCS portal][e] using IT4I credentials and go to the **Authorization Requests** section. Here you can authorize collaborators for your project.
Log in to the [IT4I SCS portal][e] using your credentials and go to the **Authorization Requests** section.
Here you can authorize collaborators for your project.
### Authorization by Email (An Alternative Approach)
### Authorization by Email (An Alternative Approach)
...
@@ -61,62 +62,6 @@ PI
...
@@ -61,62 +62,6 @@ PI
!!! note
!!! note
Web-based email interfaces cannot be used for secure communication; external application, such as Thunderbird or Outlook must be used. This way, your new credentials will be visible only in applications that have access to your certificate.
Web-based email interfaces cannot be used for secure communication; external application, such as Thunderbird or Outlook must be used. This way, your new credentials will be visible only in applications that have access to your certificate.
### Process Flow Chart
This chart describes the process of obtaining login credentials on the clusters. You may skip the tasks that you have already done. Some of the tasks, marked with asterisk (\*), are clickable and will take you to a more detailed description.
* I am a Primary Investigator and I want to allow my collaborators to access my project
<divclass="mermaid">
graph TB
id110(I am a Primary Investigator and I want to allow my collaborators to access my project)