Difference between revisions of "SSH"
m |
m |
||
Line 4: | Line 4: | ||
== Access == | == Access == | ||
− | OpenSSH is the standard ssh client on Linux and MAC and it is freely available for everyone. On Windows you can use Putty or the Gitbash (coming with ssh) which is also free. Sometimes this access is restricted, so you can only connect, when you are within the university/facility and it's Network. To still access the Log-in Nodes externally, one can 'pretend to be inside the network' by using a [[VPN|Virtual Private Network (VPN)]]. | + | OpenSSH is the standard ssh client on Linux and MAC and it is freely available for everyone. On Windows you can use Putty or the Gitbash (coming with ssh) which is also free. |
+ | |||
+ | Sometimes this access is restricted, so you can only connect, when you are within the university/facility and it's Network. To still access the Log-in Nodes externally, one can 'pretend to be inside the network' by using a [[VPN|Virtual Private Network (VPN)]]. | ||
Revision as of 11:11, 26 February 2018
General
Secure Shell (ssh) is a commandline-tool for logging into a different computer over some network (e.g. the internet) and for executing commands on that machine, as if one would be sitting there instead of the own computer. It is commonly used to log-in to the frontent Nodes of a supercomputer.
Access
OpenSSH is the standard ssh client on Linux and MAC and it is freely available for everyone. On Windows you can use Putty or the Gitbash (coming with ssh) which is also free.
Sometimes this access is restricted, so you can only connect, when you are within the university/facility and it's Network. To still access the Log-in Nodes externally, one can 'pretend to be inside the network' by using a Virtual Private Network (VPN).
Usage
Logging in with OpenSSH on a Linux Cluster is done with:
$ ssh -l <login> <cluster>
Here login is your user name and frontent Nodes is one of the frontend nodes of the system.
If you need to start graphical applications you need to enable X11 forwarding/X11 tunneling by your ssh client. For OpenSSH this is done by giving it the "-X" command line option:
$ ssh -X -l <login> <cluster>
which might or might not work depending on the your Operating System.
For more Security and easy of use you should consider setting up authentication via kryptographic keys.