Securing your account: Difference between revisions

no edit summary
No edit summary
Line 1: Line 1:
{{Draft}}
<languages />


<translate>
= Authentication =
= Authentication =
There are two primary authentication mechanisms that are used to connect to a cluster : passwords and SSH keys. Below are some best practices for both methods.  
There are two primary authentication mechanisms that are used to connect to a cluster : passwords and SSH keys. Below are some best practices for both methods.  
Line 21: Line 22:
== Sharing data ==
== Sharing data ==
When trying to share data, it can be considered convenient to change filesystem permissions to allow everyone to read or write to some files. This can compromise your account if not done properly. Please see our [[Sharing data]] page.
When trying to share data, it can be considered convenient to change filesystem permissions to allow everyone to read or write to some files. This can compromise your account if not done properly. Please see our [[Sharing data]] page.
</translate>
Bureaucrats, cc_docs_admin, cc_staff, rsnt_translations
2,837

edits