You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Next »

First Week

NSF has a new requirement that all students (undergraduate, graduate, and postdoctoral) must have had training in Responsible Conduct in Research (RCR) *before* being supported (i.e., paid) by NSF. 

Furthermore, an on-line RCR certification system has been set up for this purpose.  It is found here:

Please note the following requirements as they apply to all VSoE students:

#      all currently NSF-supported students (undergraduate, graduate, and postdoctoral) *must* complete the on-line course this spring, as per the Provost's memo;

#      all new incoming PhD students and postdocs *must* complete the on-line course before being set up on payroll;

#      all undergraduates being put on an NSF support *must* complete the on-line course before being set up on payroll;

#      PIs who have or hope to have NSF funding are urged to have all their PhD students and postdocs complete the on-line course in any case, to avoid possible future delays in student payroll if students/postdocs are moved from one grant to another.

Before the students start reading any papers, especially the Globus paper Gaurang or Karan spend 45 minutes with the students

  • giving a high level overview of the Grids.
  • explaining the various globus components
  • terminology of grid sites / grid site layout / submit hosts etc
  • security in grid. certificates etc

Workflow Papers to Read

Globus and Condor Papers to Read

Second Week

Papers to Read

Setting up of credentials

  • Help the students set up their ssh keys so that they can log on to ISI machines from their laptops/ home computers

    Setting up of SSH Keys on ISI Linux boxes

  • log on to your linux box using action provided username and password
  • cd bin
  • Create the following symbolic links
    • ln -s /usr/bin/scp scp
    • ln -s /usr/bin/ssh-add ssh-add
    • ln -s /usr/bin/ssh-agent ssh-agent
    • ln -s /usr/bin/ssh-keygen ssh-keygen
    • ln -s /usr/bin/ssh-keyscan ssh-keyscan
  • Create your private keys
    • mkdir ~/.ssh
    • ssh-keygen -t dsa -C "user isi key" -b 2048 -f ~/.ssh/isi_dsa_2048
      Enter passphrase (empty for no passphrase):
      Enter same passphrase again:
      Your identification has been saved in /nfs/asd2/username/.ssh/id_dsa_2048.
      Your public key has been saved in /nfs/asd2/username/.ssh/
      The key fingerprint is:
      14:f9:31:1a:2d:e0:11:86:cd:3a:3d:9f:35:73:24:8c user isi key
      93.340u 0.070s 4:55.37 31.6%    0+0k 0+0io 363pf+0w
      Make sure that you enter a passphrase
  • Now you have a private key/public key pair generated.
  • Setup of account to use the generated ssh key to log on to other isi machines from your linux box
    • Machines running an OpenSSH server
      • cd ~/.ssh
      • ln -s id_dsa_2048 id_dsa
      • cat > authorized_keys2
      • ssh
      • It should ask for your passphrase key
    • Machines running an SSH Secure (IETF SSH) Server
      • mkdir ~/.ssh2
      • cd ~/.ssh2
      • ssh-keygen -e -f ~/.ssh/ >
      • create a text file named authorization with following content (use emacs or vi )
      • ssh
      • It should ask for your passphrase key

For Windows Users.

Creating a Public/Private Key Pair

  1. Download and Install PuTTY for [|]
    # From the PuTTY installation directory, run PuTTYgen.
    # Select SSH-2_DSA radio button.
    # Click on the Generate button.
    # Specify a password in the Key pass-phrase and the Confirm pass-phrase fields.
    # Click Save public key and save it as
    # Click Save private key and save it as id_dsa

    h2. Setting up the public key on the remote server.
  1. Create a folder .ssh in your home directory of the remote server.
  2. Transfer the file on the remote server in the .ssh folder.
  3. Run the following commands.
    1. ssh-keygen -i -f ~/.ssh/ > ~/.ssh/ - This converts the SSH2 file format to OpenSSH file format.
    2. cat ~/.ssh/ > ~/.ssh/authorized_keys2
    3. chmod 700
    4. chmod 700 authorized_keys2
    5. chmod 600 id_dsa

Setup for remote SSH.

  1. Open PuTTY.
  2. Specify the hostname or IP Address of the remote server in the Host Name field.
  3. Click on Connection -> SSH -> Auth.
  4. Click Browse, and select the path to the id_dsa file.
  5. Click on Session.
  6. Specify any name for this session in the Saved Sessions field.
  7. Click Save.
  8. Click Open.
  9. In the newly opened terminal window, enter your user-name and pass-phrase you entered while creating the public/private key pair.

Important Note.

  • Do not distribute your private key. It should only be available to you.

Help students to get grid certificates

Pegasus Tutorial

  • Gaurang or Karan spend half day with the new student to do a hands on pegasus tutorial
  • No labels