Bureaucrats, cc_docs_admin, cc_staff, rsnt_translations
2,837
edits
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{{Draft}} | {{Draft}} | ||
= | = Authentication = | ||
There are two primary authentication mechanisms that are used to connect to a cluster : passwords and SSH keys. Below are some best practices for both methods. | There are two primary authentication mechanisms that are used to connect to a cluster : passwords and SSH keys. Below are some best practices for both methods. | ||
= Password best practices = | == Password best practices == | ||
* Users are strongly encouraged to use unique passwords, and to never reuse them. | * Users are strongly encouraged to use unique passwords, and to never reuse them. | ||
* Passwords are sensitive confidential information and users must never share or disclose them by any mean. Users should also refrain from disclosing tips that could help identify their passwords. | * Passwords are sensitive confidential information and users must never share or disclose them by any mean. Users should also refrain from disclosing tips that could help identify their passwords. | ||
Line 10: | Line 10: | ||
* Users are encouraged to not use the "remember your password" feature of browser or operating systems. | * Users are encouraged to not use the "remember your password" feature of browser or operating systems. | ||
= SSH keys best practices = | == SSH keys best practices == | ||
SSH keys can be a good way to authenticate to your account without typing your password every time. However, to be secure, it is imperative that SSH keys use a strong passphrase that is treated like a password. | SSH keys can be a good way to authenticate to your account without typing your password every time. However, to be secure, it is imperative that SSH keys use a strong passphrase that is treated like a password. | ||
For technical details on implementing SSH keys for your account, please see [[SSH_Keys|this page]]. | For technical details on implementing SSH keys for your account, please see [[SSH_Keys|this page]]. | ||
= General best practices = |