ATTENTION - THIS WIKI PAGE IS NO LONGER UPDATED - PLEASE GO TO [[http://aerocom.met.no/|aerocom.met.no]]FOR LATEST INFO ===== How to get access to the aerocom user server (Unix and MacOSX)===== This guide assumes that you are working with an Unix based (including OS X) operating system.\\ If you are using windows, you might want to have a look at [[http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html|putty]] a terminal program and [[http://winscp.net/eng/index.php|WinSCP]] a secure copy client. ==== Access ==== Conditions for access to the AeroCom data server: * A short project description of the planned analysis is send to AeroCom contact (michael.schulz@met.no) * An account is opened upon sending a request for an account to (Michael) michael.schulz@met.no and (Anna) annac@met.no and (Jan) jan.griesfeller@met.no * The project description is made available to AeroCom participants via this [[aerocom:data_base_user_overview|wiki page]] * Results from analysis are reported to AeroCom workshops * Publication-Coauthorship is offered to model and data author. See [[aerocom:data_policy|data policy]] At first you will get a username and a password for this wiki. To get access to the user server __aerocom-users.met.no__, you have to send us a ssh public key since password authentication is disabled for security reasons on the user server. You can connect to the user server via //**ssh**//, but also use //**scp**// and //**rsync**// for data transfers. For more details on AeroCom database, please read about [[https://wiki.met.no/aerocom/data_submission|data submission procedure]]. ==== How to create a ssh key ==== === Step 1: Check for SSH keys === First, we need to check for existing ssh keys on your computer. Open up Terminal and run: $ cd ~/.ssh $ ls # Lists the files in your .ssh directory Check the directory listing to see if you have a file named id_rsa.pub . If you don't, go to step 2. If you already have an existing keypair, skip to step 3. === Step 2: Generate a new SSH key === To generate a new SSH key, enter the code below. We want the default settings so when asked to enter a file in which to save the key, just press enter. $ ssh-keygen -t rsa -C "my comment" Generating public/private rsa key pair. ... Enter the path to the file that will hold the key: By default, the file name $HOME/.ssh/id_rsa, which represents an RSA v2 key, appears in parentheses. Enter file in which to save the key (/home/user/.ssh/id_rsa): Enter a passphrase for using your key: The passphrase you enter will be used for encrypting your private key. A good passphrase should be alphanumeric having 10-30 character length. You can also use a null passphrase however this can cause a security loophole. Enter passphrase (empty for no passphrase): Re-enter the passphrase to confirm it: Type your passphrase once again to confirm it. Enter same passphrase again: Your identification has been saved in /home/user/.ssh/id_rsa. Your public key has been saved in /home/user/.ssh/id_rsa.pub. The key fingerprint is: 0b:fa:3c:b8:73:71:bf:58:57:eb:2a:2b:8c:2f:4e:37 user@myLocalHost === Step 3: Send your public key to jan.griesfeller@met.no and anna.benedictow@met.no === In the folder ~/.ssh you will find file(s) ending with .pub. Please send us the one you just created e.g. id_rsa.pub. **And no other file** ==== Further information ==== This page was partly stolen from [[http://en.wikipedia.org/wiki/Ssh-keygen|wikipedia]] and [[https://help.github.com/articles/generating-ssh-keys|github]].\\ If you want to know how key authentication works, please read [[http://en.wikipedia.org/wiki/Public-key_cryptography| this article about public key cryptography]].