Inhalt |
---|
This page aims to provide you with a step-by-step guide on how to use public key authentication for external login to the NHR systems at the Berlin ("Lise") and Göttingen ("Emmy") sites. It also provides information for internal login to connect between NHR nodes in Berlin/Göttingen.
Summary
- Create an SSH key pair with a passphrase that is not used anywhere else.
- Upload your public key on our Service Portal.
- Specify your private key when connecting to our login nodes (either via
ssh -i <your_private_key_file>
or in your local SSH configuration).
Step-by-step guide
An SSH key pair consists of a public key and a private key. The public key is used to encrypt messages. Such messages can only be decrypted using the corresponding private key. For this reason the To login to system Lise please
- choose a login node of your Compute partitions and
- specify your SSH key when connecting. A pair of SSH keys consists of a
- private key. The private key must be stored safely on the local machine - protected by a passphrase
...
- .
- public key.
...
Create a pair of SSH keys
Create an SSH key pair with a passphrase that is not used anywhere else.
Generating your key pair differs depending on the SSH implementation available on your local machine. The default with Linux and MacOS is OpenSSH. This is also available (without extra installation) in more recent versions of Windows.
OpenSSH
On your local system, run ssh-keygen
in the terminal of your choice to create an SSH key pair (type RSA) with a size of 4096 bits. During the key generation process you will be asked for a passphrase to protect the key:
...
The current ssh host keys for
- gloginblogin[1-98].hlrn.deblogin[1-6].hlrn.nhr.zib.de
are:
Codeblock |
---|
SHA256:mrwKbHEz3pJCmvU7ZEXoIKxVRz0E9/4GDp3k41x4Q8g (RSA) SHA256:53WD36v+IjHObgS3DbjIi+zShcQ/MCAIqJNgJOlfR08 (ED25519) SHA256:pNGlm//LyjJZi6tX0mz5SPSs4IBkuyJI/iWI10JbhgE (ECDSA) |
For
- bgnloginbgnlogin[1-2].nhr.zib.de
- bgilogin[1-2].nhr.zib.de
the fingerprints are:
Codeblock |
---|
SHA256:rusM3G/8eG7ZFLNJtvymL/wNHFGgkOFTMYCBk3yLiL8 (ECDSA) SHA256:8/hSIv0HfMDEy1gUQjVmb0cUMDztgacNfXSBUzcgCFM (ED25519) SHA256:WulefLWFPRPPobUI6/+4bJpttV9SlQhZ0prEo8ELp1k (RSA) |
PuTTY
Under Windows, SSH key pairs can be generated with the tool PuTTYgen which is part of the PuTTY installation package and also available separately.
...
Info |
---|
PuTTY changed its default key file format in version 0.75 from PPK2 to PPK3. This is not an issue as long as you use a PuTTY version, or software using PuTTY in its core, greater 0.75 |
SSH
...
public key upload
Upload your public key on our Portal NHR@ZIB.
Before you can log in to one of the Berlin/Göttingen NHR@ZIB login nodes, make sure you have uploaded your SSH public key (not the private one) at the Service Portal NHR@ZIB. Here you can also view or remove public keys uploaded earlier (if any).
At the Service Portal NHR@ZIB, choose the item "Manage keys" / "Verwalten Ihrer Keys". For the key management you will have to log with your user name and your portal password.
...
You can upload up to seven SSH public keys at the service portal.
Hinweis |
---|
The Your SSH public keys are stored centrally in the Berlin/Göttingen our LDAP service data base. Please do not add SSH keys discussed above here to your |
...
Erweitern | ||
---|---|---|
| ||
Directory At least with Safari you can press Also, you can press Or, another workaround: copy your public key file to a path not containing any hidden files/directories. |
...
Login using SSH
...
keys
For external connections to the NHR login nodes in Berlin/Göttingen the private key of the SSH key pair is needed. Recall the name and the location (see above) of the file containing the private keyssh login please use ssh software on your local machine. On linux and windows systems OpenSSH and PuTTY is appropriate software, respectively.
OpenSSH
With the -i
option to the ssh
command you can specify the full path of your private SSH key file when you log in to one of the Berlin/Göttingen NHR@ZIB login nodes. You will be asked for the passphrase of your private key.
Example for a login to blogin (Berlin):
...
Codeblock | ||
---|---|---|
| ||
$ ssh -i $HOME/.ssh/id_rsa_nhr -l your_username blogin.hlrnusername@blogin.nhr.zib.de Enter passphrase for key '/<home_directory>/.ssh/id_rsa_nhr': [...] |
...
Kein Format |
---|
Host blogin Hostname blogin.hlrnnhr.zib.de IdentityFile ~/.ssh/id_rsa_nhr User your_username |
Now the ssh
command will automatically choose the proper credentials in the future, i. e., -l your_username
and -i <private_key>
can be omitted from the command line so that ssh blogin
is sufficient.
PuTTY
In PuTTY, you have to add/select your private key to Connection → SSH → Auth
to be able to log in. In PuTTY version 0.78 this option has changed to Connection → SSH → Auth
→ Credentials.
Internal Login
SSH for internal connections between a Berlin and a Göttingen login node nodes of Lise works right out of the box - that is, without specifying any keys. This also applies to SSH connections between nodes of the same site. This is enabled through host-based authentication which is active by default.
...
.
...
hidden | true |
---|
...