Securing your account: Difference between revisions

Jump to navigation Jump to search
Marked this version for translation
No edit summary
(Marked this version for translation)
Line 2: Line 2:


<translate>
<translate>
= Authentication =
= Authentication = <!--T:1-->
There are two primary authentication mechanisms that are used to connect to a cluster : passwords and SSH keys. Below are some best practices for both methods.  
There are two primary authentication mechanisms that are used to connect to a cluster : passwords and SSH keys. Below are some best practices for both methods.  


== Password best practices ==
== Password best practices == <!--T:2-->
* Users are strongly encouraged to use unique passwords, and to never reuse them.  
* Users are strongly encouraged to use unique passwords, and to never reuse them.  
* Passwords are sensitive confidential information and users must never share or disclose them by any mean. Users should also refrain from disclosing tips that could help identify their passwords.  
* Passwords are sensitive confidential information and users must never share or disclose them by any mean. Users should also refrain from disclosing tips that could help identify their passwords.  
Line 11: Line 11:
* Users are encouraged to not use the "remember your password" feature of browser or operating systems.
* Users are encouraged to not use the "remember your password" feature of browser or operating systems.


=== Reseting your password ===
=== Reseting your password === <!--T:3-->
If you think that your password may have been compromised, you can reset it through [https://ccdb.computecanada.ca/security/change_password this page].
If you think that your password may have been compromised, you can reset it through [https://ccdb.computecanada.ca/security/change_password this page].


== SSH keys best practices ==
== SSH keys best practices == <!--T:4-->
SSH keys can be a good way to authenticate to your account without typing your password every time. However, to be secure, it is imperative that SSH keys use a strong passphrase that is treated like a password.  
SSH keys can be a good way to authenticate to your account without typing your password every time. However, to be secure, it is imperative that SSH keys use a strong passphrase that is treated like a password.  


<!--T:5-->
For technical details on implementing SSH keys for your account, please see [[SSH_Keys|this page]].
For technical details on implementing SSH keys for your account, please see [[SSH_Keys|this page]].


= General best practices =
= General best practices = <!--T:6-->
== Sharing data ==
== Sharing data ==
When trying to share data, it can be considered convenient to change filesystem permissions to allow everyone to read or write to some files. This can compromise your account if not done properly. Please see our [[Sharing data]] page.
When trying to share data, it can be considered convenient to change filesystem permissions to allow everyone to read or write to some files. This can compromise your account if not done properly. Please see our [[Sharing data]] page.
</translate>
</translate>
Bureaucrats, cc_docs_admin, cc_staff, rsnt_translations
2,837

edits

Navigation menu