Skip to content

Obtaining Login Credentials

Obtaining Authorization

The computational resources of IT4I are allocated by the Allocation Committee to a Project investigated by a Primary Investigator. By allocating the computational resources, the Allocation Committee is authorizing the PI to access and use the clusters. The PI may decide to authorize a number of their collaborators to access and use the clusters to consume the resources allocated to their Project. These collaborators will be associated to the Project. The Figure below is depicting the authorization chain:

Note

You need to either become a PI or be named as a collaborator by a PI in order to access and use the clusters.

The head of Supercomputing Services acts as a PI of the project DD-13-5. Joining this project, you may access and explore the clusters and use software, development environment, and computers via the qexp queue. You may use these resources for own education/research, no paperwork is required. The DD-13-5 project is not intended for production calculations. In such a case, please apply for your own project. All IT4I employees may contact the head of Supercomputing Services in order to obtain free access to the clusters.

Authorization of PI by Allocation Committee

The PI is authorized to use the clusters by the allocation decision issued by the Allocation Committee. The PI will be informed by IT4I about the Allocation Committee decision.

Process Flow Chart

This chart describes the process of obtaining login credentials on the clusters. You may skip the tasks that you have already done. Some of the tasks, marked with asterisk (*), are clickable and will take you to a more detailed description.

  • I am a collaborator on a project and want to obtain login credentials
graph TB id10(I am a collaborator on a project and want to obtain login credentials) id20[Obtain a certificate for digital signature] id10-->id20 id30[EduID organizations from CESNET*] click id30 "#certificates-for-digital-signatures" id40[Personal certificate from PostSignum or I.CA] id50[Free certificate from Sectigo / Comodo*] click id50 "#alternative-way-to-personal-certificate" id55[Other trusted certificate] subgraph "" id20-->id30 id20-->id40 id20-->id50 id20-->id55 end id60[Export and save the certificate to a file] id30-->id60 id40-->id60 id50-->id60 id55-->id60 id70[Import the certificate into your email client*] click id70 "#installation-of-the-certificate-into-your-mail-client" id60-->id70 id80[Send an email with request for access to IT4I Support*] click id80 "#login-credentials" id70-->id80
  • I am a Primary Investigator and I want to allow my collaborators to access my project
graph TB id110(I am a Primary Investigator and I want to allow my collaborators to access my project) id120[Obtain a certificate for digital signature] id110-->id120 id130[EduID organizations from CESNET*] click id130 "#certificates-for-digital-signatures" id140[Personal certificate from PostSignum or I.CA] id150[Free certificate from Sectigo / Comodo*] click id150 "#alternative-way-to-personal-certificate" id155[Other trusted certificate] subgraph "" id120-->id130 id120-->id140 id120-->id150 id120-->id155 end id160[Export and save the certificate to a file] id130-->id160 id140-->id160 id150-->id160 id155-->id160 id170[Import the certificate into your email client*] click id170 "#installation-of-the-certificate-into-your-mail-client" id160-->id170 id180[Send an email with request for authorization to IT4I Support*] click id180 "#authorization-by-e-mail-an-alternative-approach" id170-->id180
  • I am an existing user/Primary Investigator and I want to manage my projects/users
graph TB id210(I am an existing user/Primary Investigator and I want to manage my projects/users) id220[Log into scs.it4i.cz] id230[Go to the Authorization Requests section] id210-->id220 id220-->id230 id240[Submit a request to become a project member] id245[Wait for an approval from the Primary Investigator] id230-->|User|id240 id240-->id245 id250[Wait for a user to submit the request to become a project member] id255[Approve or deny user requests for becoming project members] id230-->|Primary Investigator|id250 id250-->id255 id240-.->id255

Login Credentials

Once authorized by a PI, every person (PI or collaborator) wishing to access the clusters should contact the IT4I support (email: support[at]it4i.cz) providing the following information:

  1. Project ID
  2. Full name and affiliation
  3. Statement that you have read and accepted the Acceptable use policy document (AUP).
  4. Attach the AUP file.
  5. Your preferred username (3 to 12 characters). The preferred username must associate with your first and last name or be otherwise derived from it. Only alphanumeric sequences and dash signs are allowed.
  6. In case you choose an Alternative way to personal certificate, a scan of photo ID (personal ID or passport or driver license) is required.

Warning

Should the above information be provided by email, the email must be digitally signed. Read more on digital signatures below.

Hint

VSB associates will be given a VSB login username.

Example (except the subject line, which must be in English, you may use Czech or Slovak language for communication with us):

Subject: Access to IT4Innovations

Dear support,

Please open the user account for me and attach the account to OPEN-0-0
Name and affiliation: John Smith, john.smith@myemail.com, Department of Chemistry, MIT, US
I have read and accept the Acceptable use policy document (attached)

Preferred username: johnsm

Thank you,
John Smith
(Digitally signed)

You will receive your personal login credentials by protected email. The login credentials include:

  1. username
  2. SSH private key and private key passphrase
  3. system password

The clusters are accessed by the private key and username. Username and password are used for login to the information systems.

Authorization by Web

Warning

Only for those who already have their IT4I HPC account. This is a preferred way of granting access to project resources. Please, use this method when possible.

This is a preferred way of granting access to project resources. Please, use this method whenever it's possible.

Log in to the IT4I SCS portal using IT4I credentials and go to the Authorization Requests section.

  • Users: Please, submit your requests for becoming a project member.
  • Primary Investigators: Please, approve or deny users' requests in the same section.

Authorization by EMail (An Alternative Approach)

In order to authorize a Collaborator to utilize the allocated resources, the PI should contact the IT4I support (email: support[at]it4i.cz) and provide the following information:

  1. Identify their project by project ID.
  2. Provide a list of people, including themself, who are authorized to use the resources allocated to the project. The list must include the full name, email and affiliation. If collaborators' login access already exists in the IT4I systems, provide their usernames as well.
  3. Include "Authorization to IT4Innovations" into the subject line.

Warning

Should the above information be provided by email, the email must be digitally signed. Read more on digital signatures below.

Example (except the subject line which must be in English, you may use Czech or Slovak language for communication with us):

Subject: Authorization to IT4Innovations

Dear support,

Please include my collaborators to project OPEN-0-0.

John Smith, john.smith@myemail.com, Department of Chemistry, MIT, US
Jonas Johansson, jjohansson@otheremail.se, Department of Physics, RIT, Sweden
Luisa Fibonacci, lf@emailitalia.it, Department of Mathematics, National Research Council, Italy

Thank you,
PI
(Digitally signed)

Change Passphrase

On Linux, use:

local $ ssh-keygen -f id_rsa -p

On Windows, use PuTTY Key Generator.

Certificates for Digital Signatures

We accept personal certificates issued by any widely respected certification authority (CA). This includes certificates by CAs organized in International Grid Trust Federation, its European branch EUGridPMA and its member organizations, e.g. the CESNET certification authority. The Czech "Qualified certificate" (Kvalifikovan√Ĺ certifik√°t) provided by PostSignum or I.CA, which is used in electronic contact with Czech authorities, is accepted as well.

Certificate generation process for academic purposes, utilizing the CESNET certification authority, is well described here:

Note

The certificate file can be installed into your email client. Web-based email interfaces cannot be used for secure communication, external application, such as Thunderbird or Outlook must be used. This way, your new credentials will be visible only in applications that have access to your certificate.

If you are not able to obtain the certificate from any of the respected certification authorities, follow the Alternative Way below.

A FAQ about certificates can be found here: Certificates FAQ.

Alternative Way to Personal Certificate

Follow these steps only if you cannot obtain your certificate in a standard way. If you choose this procedure, attach a scan of photo ID (personal ID or passport or driver's license) when applying for login credentials.

Warning

Please use Firefox ESR (clone) for the following steps. Other browsers, like Chrome, are not compatible.

  • Go to Sectigo / Comodo Application for Secure Email Certificate.
  • Fill in the form, accept the Subscriber Agreement and submit it by the Next button.
  • Type in the email address, which you intend to use for communication with us.
  • Do not forget your chosen Revocation password.
  • You will receive an email with link to collect your certificate. Be sure to open the link in the same browser, in which you submitted the application.
  • Your browser should notify you, that the certificate has been correctly installed in it. Now you will need to save it as a file.
  • In Firefox navigate to Options > Advanced > Certificates > View Certificates.
  • Choose the Your Certificates tab and find the fresh certificate with today's date.
  • Select it and click the Backup... button
  • A standard save dialog should appear, where you can choose a name for the certificate file for easy identification in the future.
  • You will be prompted to choose a passphrase for your new certificate. This passphrase will be needed for installation into your favorite email client.

Note

The certificate file can now be installed into your email client. Web-based email interfaces cannot be used for secure communication; external application, such as Thunderbird or Outlook must be used (instructions below). This way, your new credentials will be visible only in applications that have access to your certificate.

Installation of the Certificate Into Your Email Client

The procedure is similar to the following guides:

MS Outlook 2010

Mozilla Thunderbird

End of User Account Lifecycle

User accounts are supported by membership in active project(s) or by affiliation to IT4Innovations. User accounts that lose the support (i.e. are not attached to an active project and are not affiliated with IT4I) will be deleted 1 year after the last project expires to which they were attached.

Users will get 3 automatically generated warning email messages of the pending removal:.

  • First message will be sent 3 months before the removal
  • Second message will be sent 1 month before the removal
  • Third message will be sent 1 week before the removal.

These messages will inform about the projected removal date and will prompt the user to migrate their data.

Comments