Skip to content

Obtaining an account

Access to the FRIDA compute infrastructure is granted (upon request) to all employees of UL FRI. Under the guidance and responsibility of a UL FRI employee access can be granted also to students who cooperate on research lab projects, or require access to the infrastructure to work on their doctoral, master's or diploma theses. The access request must come from a UL FRI employee (supervisor), stating the research lab, project, and/or thesis topic, as well as the duration for which access is requested.

Requests for access, as well as technical questions, should be directed to frida@rdc.si.

Stale accounts

Usage of FRIDA is monitored to ensure fair sharing of the available resources. Stale accounts, i.e. accounts that did not submit any jobs in the last 6 months, are automatically disabled, and the account-associated data is archived. If the account was the last account of a specific research lab, group, or project, the corresponding research lab, group, or project data is archived as well.

The archived data is kept for 3 additional months to facilitate an eventual reenablement of the account or download of the associated data upon request. After this grace period, all data is permanently deleted.

Passwordless access

In line with the UL security policies, access to FRIDA is strictly multi-factor authentication (MFA) based. To achieve the most seamless integration and provide the best possible user experience, FRIDA opted for Teleport (see How Teleport Works) and the corresponding tsh Command Line Interface (CLI) client (see Using the tsh Command Line Tool). Teleport works via HTTPS tunneling, so you can also use it from any restricted networks that prohibit normal SSH connections (port 22/TCP).

Tip

For the best user experience, we suggest users set up their accounts for passwordless access via Apple Touch ID, Windows Hello or Yubikey BIO. A less user-friendly alternative is 2FA via hardware token (e.g. Youbikey 5C Nano) or OTP (e.g. Raivo or some other OTP Authenticator App).

Registration

Once granted access to your request, you will receive a Teleport signup link. Open the link, click on Use password and follow the instructions to register a password and OTP device. You can also register a hardware key (Apple Touch ID, Windows Hello, or Yubikey) for passwordless web access.

Warning

Registration of a password and OTP device during the registration process is mandatory, otherwise you will later not be able to register a hardware key for CLI access.

Once the registration is finished, follow the official Teleport instructions to install the Teleport Community Edition of the tsh CLI client appropriate to your OS (macOS, Windows, or Linux). Ensure that the tsh client install location is included in your PATH variable. If you wish to do so, you can, as an addition, install Teleport Connect (a Graphical User Interface (GUI) desktop client), but for most use cases this is not necessary.

Warning

To have TouchID support on macOS make sure to install the package that contains only the tsh binary. Support can be checked by running tsh touchid diag.

Now you can register your hardware key (Apple Touch ID, Windows Hello, or Yubikey BIO) to enable passwordless infrastructure access also via CLI. To do so, you execute the following commands in your terminal. For successful registration, you will need to provide your password and second-factor key (OTP).

$ tsh --proxy=rdc.si --user={username} --mfa-mode=otp --auth=local login
Enter password for Teleport user {username}:
Enter an OTP code from a device:
> Profile URL:        https://rdc.si:443
  Logged in as:       {username}
  Cluster:            rdc.si
  Roles:              access_app_grafana_frida, access_frida
  Logins:             {username}
  Kubernetes:         enabled
  Valid until:        2024-02-14 19:35:00 +0100 CET [valid for 8h0m0s]
  Extensions:         login-ip, permit-agent-forwarding, permit-port-forwarding, permit-pty, private-key-policy

Did you know? Teleport Connect offers the power of tsh in a desktop app.
Learn more at https://goteleport.com/docs/connect-your-client/teleport-connect/

$ tsh --proxy=rdc.si --user={username} --mfa-mode=otp --auth=local mfa add --type=TOUCHID --name=touchid.cli
Enter an OTP code from a *registered* device:
Using platform authenticator, follow the OS prompt
MFA device "touchid.cli" added.

Note

In contrast to Windows Hello and Yubikey, you will need to register your Apple TouchID multiple times: once for CLI access, and once for every browser that you wish to use. This is by design, a security requirement of Apple TouchID.

First access

Use the tsh client to authenticate yourself to the FRIDA Teleport gateway

$ tsh --proxy=rdc.si --user={username} login

Note

FRIDA is configured to be passwordless first, meaning, in case you do not enable passwordless CLI access, you must add --mfa-mode=otp --auth=local to all tsh --proxy=rdc.si commands.

Upon successful authentication create or edit the SSH config file corresponding to your OS (~/.ssh/config on Unix-like, %userprofile%/.ssh/config on Windows systems), and add to the top the snippet that you obtain by running the following command.

$ tsh config

While doing so, add also the following lines to the end of the section marked as # Common flags for all ... hosts. These lines are not mandatory but will reduce the number of times that you need to reauthenticate yourself, as well as, use a forwarding agent to automatically forward your locally stored SSH keys so that you can access other machines with your private SSH keys.

ServerAliveInterval 300
ServerAliveCountMax 2
TCPKeepAlive yes
ForwardAgent yes
AddKeysToAgent yes

Save the SSH config and you are set to go. From now on you can interact with FRIDA by running standard ssh and scp commands.

VSCode and Remote SSH access to the login node

Visual Studio Code's Remote SSH extension (part of the Remote Development Extension pack) in the Remote Explorer does not list wildcard-based hosts declared in the SSH config file. To have the FRIDA login node available in Remote Explorer you must add it to the SSH config file explicitly.

# FRIDA login host for VSCode Remote SSH
Host login-frida
    Hostname login-frida.rdc.si
    User {username}
    # copy from '# Common flags for all rdc.si hosts'
    UserKnownHostsFile "/Users/{username}/.tsh/known_hosts"
    IdentityFile "/Users/{username}/.tsh/keys/rdc.si/{username}"
    CertificateFile "/Users/{username}/.tsh/keys/rdc.si/{username}-ssh/rdc.si-cert.pub"
    HostKeyAlgorithms rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com
    # copy from '# Flags for all rdc.si hosts except the proxy'
    Port 3022
    ProxyCommand "/usr/local/bin/tsh" proxy ssh --cluster=rdc.si --proxy=rdc.si:443 %r@%h:%p
    # copy from '# Flags for all rdc.si hosts except the proxy', optional lines that were appended during First access
    ServerAliveInterval 300
    ServerAliveCountMax 2
    TCPKeepAlive yes
    ForwardAgent yes
    AddKeysToAgent yes
# FRIDA login host for VSCode Remote SSH
Host login-frida
    Hostname login-frida.rdc.si
    User {username}
    # copy from '# Common flags for all rdc.si hosts'
    UserKnownHostsFile "/home/{username}/.tsh/known_hosts"
    IdentityFile "/home/{username}/.tsh/keys/rdc.si/{username}"
    CertificateFile "/home/{username}/.tsh/keys/rdc.si/{username}-ssh/rdc.si-cert.pub"
    HostKeyAlgorithms rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com
    # copy from '# Flags for all rdc.si hosts except the proxy'
    Port 3022
    ProxyCommand "/usr/local/bin/tsh" proxy ssh --cluster=rdc.si --proxy=rdc.si:443 %r@%h:%p
    # copy from '# Flags for all rdc.si hosts except the proxy', optional lines that were appended during First access
    ServerAliveInterval 300
    ServerAliveCountMax 2
    TCPKeepAlive yes
    ForwardAgent yes
    AddKeysToAgent yes

Make sure that tsh.exe is on your PATH.

# FRIDA login host for VSCode Remote SSH
Host login-frida
    Hostname login-frida.rdc.si
    User {username}
    # copy from '# Common flags for all rdc.si hosts'
    UserKnownHostsFile "C:\Users\{username}\.tsh\known_hosts"
    IdentityFile "C:\Users\{username}\.tsh\keys\rdc.si\{username}"
    CertificateFile "C:\Users\{username}\.tsh/keys\rdc.si\{username}-ssh\rdc.si-cert.pub"
    HostKeyAlgorithms rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com
    # copy from '# Flags for all rdc.si hosts except the proxy'
    Port 3022
    ProxyCommand tsh proxy ssh --cluster=rdc.si --proxy=rdc.si:443 %r@%h:%p
    # copy from '# Flags for all rdc.si hosts except the proxy', optional lines that were appended during First access
    ServerAliveInterval 300
    ServerAliveCountMax 2
    TCPKeepAlive yes
    ForwardAgent yes
    AddKeysToAgent yes

Note

To be compatible with Teleport connections, Visual Studio Code needs to be configured properly, i.e. the Remote.SSH: Use Local Server config setting must be disabled. For details see the official Teleport documentation.