Automation in the context of multifactor authentication: Difference between revisions

No edit summary
Line 7: Line 7:
= Increased security measures = <!--T:2-->
= Increased security measures = <!--T:2-->
== Available only by request ==
== Available only by request ==
If you need to make use of an automated workflow for their research, contact our [[technical support]] and request access to an automation node. When contacting us, please explain in detail the type of automation you intend to use. Tell us what commands will be executed and what tools or libraries you will be using to manage the automation.
If you need to make use of an automated workflow for your research, contact our [[technical support]] and request access to an automation node. When contacting us, please explain in detail the type of automation you intend to use. Tell us what commands will be executed and what tools or libraries you will be using to manage the automation.


== Available only through constrained SSH keys == <!--T:3-->
== Available only through constrained SSH keys == <!--T:3-->
Bureaucrats, cc_docs_admin, cc_staff
2,879

edits