Child pages
  • Logging In

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The authentication method that implements two factor authc, "keyboard-interactive", is only available on clients that speak the SSH-2 protocol.  Older UW-branded Teraterm speaks only SSH-1, and will not work for getting in directly to hyak in one hop. Users of older UW teraterm should install a newer ssh client.  See https://itconnect.uw.edu/wares/uware/putty-software/ for one option.

Set up password-less access to the nodes

  • Note: New users will have an ssh key generated for them automatically the first time they log in to hyak, and will have password-less access to the nodes.
  • The keys are stored in ~/.ssh/

Create an ssh key using ssh-keygen

No Format
 [Your UWNetID@hyak ~]$ ssh-keygen 
 Generating public/private rsa key pair.
 Enter file in which to save the key (/usr/lusers/Your_UWNetID/.ssh/id_rsa): 
 Enter passphrase (empty for no passphrase): 
 Enter same passphrase again: 
 Your identification has been saved in /usr/lusers/Your_UWNetID/.ssh/id_rsa.
 Your public key has been saved in /usr/lusers/Your_UWNetID/.ssh/id_rsa.pub.
 The key fingerprint is:
 6e:82:23:0d:a6:fb:e4:5d:5c:46:c3:6d:04:6d:9b:72 Your_UWNetID@hyak

Copy .ssh/id_rsa.pub to .ssh/authorized_keys

No Format
 [Your UWNetID@hyak ~]$ cp .ssh/id_rsa.pub .ssh/authorized_keys

Try connecting to n0400 to make sure password-less authentication is set up.

No Format
 [Your UWNetID@hyak ~]$ ssh n0400
 Last login: Fri Nov 13 14:59:15 2009 from hyak.cluster.net
 [Your UWNetID@n0400 ~]$

 

Shells

By default users are set up with the bash shell. We recommend bash unless a user is sufficiently advanced to troubleshoot all of their own shell issues. For the complexity of things people typically do in their login scripts, there's little difference between shells. There's also little difference in interactive features between any of the shells at this point. Your shell becomes even less relevant if you're following best practices and using Environment Modules.

...