@@ -59,7 +59,7 @@ New users can apply for a trial account with limited core/GPU hours without a pr
...
@@ -59,7 +59,7 @@ New users can apply for a trial account with limited core/GPU hours without a pr
For security reasons, you can't login with a username/password. We use a system called **2-Factor-Authentication** (2FA/MFA), meaning you need to prove your identity with two different (as in different systems/locations) 'factors':
For security reasons, you can't login with a username/password. We use a system called **2-Factor-Authentication** (2FA/MFA), meaning you need to prove your identity with two different (as in different systems/locations) 'factors':
- The first factor is an SSH public key. Please send your SSH *public* key to
- The first factor is an SSH public key. Please send your SSH *public* key to
the HPC team.[general information on public key authentication](https://www.ssh.com/academy/ssh/public-key-authentication)
the HPC team.[General information on public key authentication](https://www.ssh.com/academy/ssh/public-key-authentication)
- As the second factor we use Cisco Duo. To use it, you will need to enroll
- As the second factor we use Cisco Duo. To use it, you will need to enroll
your account, see [cisco-duo-setup.pdf](uploads/cd518a29f4362a9383c7345a975ed065/cisco-duo-setup.pdf) .
your account, see [cisco-duo-setup.pdf](uploads/cd518a29f4362a9383c7345a975ed065/cisco-duo-setup.pdf) .
...
@@ -98,8 +98,8 @@ Enter passphrase (empty for no passphrase):
...
@@ -98,8 +98,8 @@ Enter passphrase (empty for no passphrase):
```
```
Enter same passphrase again:
Enter same passphrase again:
Your identification has been saved in /home//<username>/.ssh/id_ed25519
Your identification has been saved in /home/<username>/.ssh/id_ed25519
Your public key has been saved in /home//<username>/.ssh/id_ed25519.pub
Your public key has been saved in /home/<username>/.ssh/id_ed25519.pub
The key fingerprint is:
The key fingerprint is:
SHA256:mDIS+q3blablaBLABLAjePkEMEoR4sAIVumEoJiCXDNVs Your Name
SHA256:mDIS+q3blablaBLABLAjePkEMEoR4sAIVumEoJiCXDNVs Your Name
The key's randomart image is:
The key's randomart image is:
...
@@ -114,7 +114,7 @@ You can ignore the rest of the output. The keypair is stored under \~/.ssh/id_ed
...
@@ -114,7 +114,7 @@ You can ignore the rest of the output. The keypair is stored under \~/.ssh/id_ed
```
```
cat ~/.ssh/id_ed25519.pub
cat ~/.ssh/id_ed25519.pub
```
```
**Please send the public key to: [hpc-mgr@uni-koeln.de](mailto:hpc-mgr@uni-koeln.de)**
If `ssh` on your computer is old, it will not know the key type ed25519.
If `ssh` on your computer is old, it will not know the key type ed25519.
In this case use
In this case use
...
@@ -161,8 +161,7 @@ Any text editor will work for this.
...
@@ -161,8 +161,7 @@ Any text editor will work for this.
**PLEASE NOTE**: Do no share SSH Keys with other people and do not copy private keys to other computers. Just create new SSH Key pairs on each computer you use regularly. You can also use [SSH Agent Forwarding](https://docs.github.com/en/authentication/connecting-to-github-with-ssh/using-ssh-agent-forwarding), where an SSH Key is taken along into a SSH session to a remote computer, eliminating the need to create many keys.
**PLEASE NOTE**: Do no share SSH Keys with other people and do not copy private keys to other computers. Just create new SSH Key pairs on each computer you use regularly. You can also use [SSH Agent Forwarding](https://docs.github.com/en/authentication/connecting-to-github-with-ssh/using-ssh-agent-forwarding), where an SSH Key is taken along into a SSH session to a remote computer, eliminating the need to create many keys.
Once you received your access credentials and set up your SSH keys and Cisco Duo App(s), you have to send us the **public** part of your keypair. (*.pub). **AGAIN:NEVER EVER SHARE THE PRIVATE KEY**
Please send the public key to: [hpc-mgr@uni-koeln.de](mailto:hpc-mgr@uni-koeln.de)