diff --git a/docs.it4i/get-started-with-it4innovations/applying-for-resources.md b/docs.it4i/get-started-with-it4innovations/applying-for-resources.md index e66d7a5755caa1089ed7a407506013f018f23f44..af48378d62a003bd9bfd64dcdf0c1616075750a4 100644 --- a/docs.it4i/get-started-with-it4innovations/applying-for-resources.md +++ b/docs.it4i/get-started-with-it4innovations/applying-for-resources.md @@ -9,4 +9,4 @@ Anyone is welcomed to apply via the [Directors Discretion.](http://www.it4i.cz/o Foreign (mostly European) users can obtain computational resources via the [PRACE (DECI) program](http://www.prace-ri.eu/DECI-Projects). -In all cases, IT4Innovations’ access mechanisms are aimed at distributing computational resources while taking into account the development and application of supercomputing methods and their benefits and usefulness for society. The applicants are expected to submit a proposal. In the proposal, the applicants **apply for a particular amount of core-hours** of computational resources. The requested core-hours should be substantiated by scientific excellence of the proposal, its computational maturity and expected impacts. Proposals do undergo a scientific, technical and economic evaluation. The allocation decisions are based on this evaluation. More information at [Computing resources allocation](http://www.it4i.cz/computing-resources-allocation/?lang=en) and [Obtaining Login Credentials](obtaining-login-credentials.md) page. \ No newline at end of file +In all cases, IT4Innovations’ access mechanisms are aimed at distributing computational resources while taking into account the development and application of supercomputing methods and their benefits and usefulness for society. The applicants are expected to submit a proposal. In the proposal, the applicants **apply for a particular amount of core-hours** of computational resources. The requested core-hours should be substantiated by scientific excellence of the proposal, its computational maturity and expected impacts. Proposals do undergo a scientific, technical and economic evaluation. The allocation decisions are based on this evaluation. More information at [Computing resources allocation](http://www.it4i.cz/computing-resources-allocation/?lang=en) and [Obtaining Login Credentials](get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials/) page. \ No newline at end of file diff --git a/docs.it4i/get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials.md b/docs.it4i/get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials.md index c10c1392a3711b04c6954582d98673e48bb126d9..3f14fae9856f0dc5e33867a426de4ce2c5884c11 100644 --- a/docs.it4i/get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials.md +++ b/docs.it4i/get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials.md @@ -3,11 +3,11 @@ Obtaining Login Credentials Obtaining Authorization ----------------------- -The computational resources of IT4I are allocated by the Allocation Committee to a [Project](../introduction.md), investigated by a Primary Investigator. By allocating the computational resources, the Allocation Committee is authorizing the PI to access and use the clusters. The PI may decide to authorize a number of her/his Collaborators to access and use the clusters, to consume the resources allocated to her/his Project. These collaborators will be associated to the Project. The Figure below is depicting the authorization chain: +The computational resources of IT4I are allocated by the Allocation Committee to a [Project](../index/), investigated by a Primary Investigator. By allocating the computational resources, the Allocation Committee is authorizing the PI to access and use the clusters. The PI may decide to authorize a number of her/his Collaborators to access and use the clusters, to consume the resources allocated to her/his Project. These collaborators will be associated to the Project. The Figure below is depicting the authorization chain:  -You need to either [become the PI](../applying-for-resources.md) or [be named as a collaborator](obtaining-login-credentials.md#authorization-of-collaborator-by-pi) by a PI in order to access and use the clusters. +You need to either [become the PI](get-started-with-it4innovations/applying-for-resources/) or [be named as a collaborator](get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials/#authorization-of-collaborator-by-pi) by a PI in order to access and use the clusters. Head of Supercomputing Services acts as a PI of a project DD-13-5. Joining this project, you may **access and explore the clusters**, use software, development environment and computers via the qexp and qfree queues. You may use these resources for own education/research, no paperwork is required. All IT4I employees may contact the Head of Supercomputing Services in order to obtain **free access to the clusters**. @@ -50,7 +50,7 @@ Example (except the subject line which must be in English, you may use Czech or (Digitally signed) ``` -Should the above information be provided by e-mail, the e-mail **must be** digitally signed. Read more on [digital signatures](obtaining-login-credentials.md#the-certificates-for-digital-signatures) below. +Should the above information be provided by e-mail, the e-mail **must be** digitally signed. Read more on [digital signatures](get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials/#the-certificates-for-digital-signatures) below. The Login Credentials ------------------------- @@ -61,7 +61,7 @@ Once authorized by PI, every person (PI or Collaborator) wishing to access the c 3. Statement that you have read and accepted the [Acceptable use policy document](http://www.it4i.cz/acceptable-use-policy.pdf) (AUP). 4. Attach the AUP file. 5. Your preferred username, max 8 characters long. The preferred username must associate your surname and name or be otherwise derived from it. Only alphanumeric sequences, dash and underscore signs are allowed. -6. In case you choose [Alternative way to personal certificate](obtaining-login-credentials.md#alternative-way-of-getting-personal-certificate), +6. In case you choose [Alternative way to personal certificate](get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials/#alternative-way-of-getting-personal-certificate), a **scan of photo ID** (personal ID or passport or driver license) is required Example (except the subject line which must be in English, you may use Czech or Slovak language for communication with us): @@ -82,7 +82,7 @@ Example (except the subject line which must be in English, you may use Czech or (Digitally signed) ``` -Should the above information be provided by e-mail, the e-mail **must be** digitally signed. To sign an e-mail, you need digital certificate. Read more on [digital signatures](obtaining-login-credentials.md#the-certificates-for-digital-signatures) below. +Should the above information be provided by e-mail, the e-mail **must be** digitally signed. To sign an e-mail, you need digital certificate. Read more on [digital signatures](get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials/#the-certificates-for-digital-signatures) below. Digital signature allows us to confirm your identity in remote electronic communication and provides an encrypted channel to exchange sensitive information such as login credentials. After receiving your signed e-mail with the requested information, we will send you your login credentials (user name, key, passphrase and password) to access the IT4I systems. @@ -96,7 +96,7 @@ You will receive your personal login credentials by protected e-mail. The login 2. ssh private key and private key passphrase 3. system password -The clusters are accessed by the [private key](../accessing-the-clusters/ssh-keys.md) and username. Username and password is used for login to the information systems listed on <http://support.it4i.cz/>. +The clusters are accessed by the [private key](get-started-with-it4innovations/accessing-the-clusters/shell-access-and-data-transfer/ssh-keys/) and username. Username and password is used for login to the information systems listed on <http://support.it4i.cz/>. ### Change Passphrase @@ -106,7 +106,7 @@ On Linux, use local $ ssh-keygen -f id_rsa -p ``` -On Windows, use [PuTTY Key Generator](../accessing-the-clusters/shell-access-and-data-transfer/puttygen.md). +On Windows, use [PuTTY Key Generator](get-started-with-it4innovations/accessing-the-clusters/shell-access-and-data-transfer/puttygen/). ### Change Password @@ -120,11 +120,11 @@ Certificate generation process is well-described here: - [How to generate a personal TCS certificate in Mozilla Firefox web browser (in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/moz-cert-gen) -A FAQ about certificates can be found here: >[Certificates FAQ](certificates-faq.md). +A FAQ about certificates can be found here: [Certificates FAQ](get-started-with-it4innovations/obtaining-login-credentials/certificates-faq/). Alternative Way to Personal Certificate ------------------------------------------- -Follow these steps **only** if you can not obtain your certificate in a standard way. In case you choose this procedure, please attach a **scan of photo ID** (personal ID or passport or drivers license) when applying for [login credentials](obtaining-login-credentials.md#the-login-credentials). +Follow these steps **only** if you can not obtain your certificate in a standard way. In case you choose this procedure, please attach a **scan of photo ID** (personal ID or passport or drivers license) when applying for [login credentials](get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials/#the-login-credentials). 1. Go to <https://www.cacert.org/>. - If there's a security warning, just acknowledge it.