►
From YouTube: 2. Accounts and Allocations
Description
Learn about NERSC accounts and allocations, and tips for using yours.
Slides for all sessions can be downloaded from here: https://www.nersc.gov/users/training/events/new-user-training-june-21-2019/
A
If
you
have
problems
with
your
passwords
or
mfa
or
trying
to
get
logged
in
you'll,
probably
talk
to
either
myself
or
my
partner
mark
mark
here.
So
we'll
just
go
through
this
real
quick
because
I'm,
assuming
most
of
you
already
have
accounts
so
there's
two
type
of
types
of
accounts
that
we
have
at
nurse.
We've
got
your
personal
user
account.
This
is
your
login
or
user
name.
It
provides
authentication
and
authorization.
A
A
You
can
request
an
account
on
your
own
if
you
don't
already
have
one
or
the
principle
investigator
of
the
project
that
you
need
to
be
associated
with,
can
add,
add
an
account
for
you
if
you
already
have
an
account
and
you
need
to
belong
to
multiple
projects.
The
way
to
do
that
is
to
have
the
P
I.
Add
your
existing
account
to
the
project
rather
than
creating
a
brand
new
one.
A
There
are
three
different
types
of
roles
right
now
that
we
have
the
principal
investigator
a
project
manager,
which
is
sometimes
referred
to
as
a
PI
proxy.
This
person
is
allowed
to
do
things
for
the
PI,
because
P
eyes
are
too
busy
to
do
it
themselves
and,
of
course,
the
users.
The
second
type
of
account
we
have
are
the
project
allocation
accounts,
also
known
as
a
repository
or
repo.
This
is
like
a
bank
account.
A
A
Fair
for
everyone,
you
get
a
you,
get
a
quota
within
each
project
of
how
much
time
you
can
use
how
much
storage
space
you
can
use,
that's
managed
by
the
PI
or
the
project
managers,
and
if,
of
course,
if
you're
on
the
computers,
you
have
at
least
one
repo-
and
you
can't
have
more.
If
you
belong
to
different
projects,
then,
depending
upon
what
programs
you're
running
you'll,
have
to
specify
what
repo
you
want
it
to
run
against.
A
Okay,
so
the
nurse
conformations
I
lovingly
known
as
NIM-
it's
been
around
for
almost
20
years
and
it's
slowly
fading
into
the
sunset
and
it's
gonna
be
replaced,
but
that's
somebody
else's
story.
This
is
where
you
would
go
to
check
things
like
your
the
balance
that
you
have
in
your
repo
that
you
have
access
to.
A
That
will
allow
you
to
do
the
actions
like
the
actions
menu
on
the
right-hand
side.
That's
where
you
do
things
like
change.
Your
default.
Login.
Shell
generate
an
HP
SS
token,
which
is
a
special
kind
of
a
soft
token
that
you
need
to
use
to
easily
access
HP
SS
using
utilities
such
as
HSI
and
then
below
that
are
the
on
the
yellow
bar
or
other
two
are
the
your
personal
information
tabs,
such
as
the
account
usage,
the
UNIX
groups.
A
This
is
a
old
screenshot
of
the
account
usage
summary.
This
person
belonged
to
three
different
projects
or
three
different
repos.
You
can
see
how
much
time
they've
used,
how
much
they're
allowed
from
there's
a
show
up
here-
probably
not
oh
yeah,
how
much
they're
allowed
to
use
from
each
repository
and
the
balance
of
time
that
they
have
left.
You
also
see
over
here
that
this
particular
repo
is
their
default.
Repo
and
also
this
is
like
the
base.
One
there's
a
whole
strategy
behind.
A
Okay,
our
policies
are
all
set
out
in
our
appropriate
use
policy
form
if
you
request
an
account
through
the
self-service
account
request
page.
This
form
was
incorporated
into
that
page.
So
you
got
a
lot
of
nice
reading
to
do
to
see
what
you
can
and
cannot
do,
and
then
you
have
to
attest
to
say
that
yes,
I
will
follow
the
rules.
A
A
Since
we've
included
multi-factor
authentication,
there's
been
a
lot
of
discussion
about
changing
that,
but
it's
still
in
the
discussion
phase,
so
you're
still
stuck
with
changing
your
password
every
six
months.
The
big
no-no
don't
share
your
password
and
don't
email,
your
password
to
us
saying
I
changed
my
password
because
then
we'll
have
to
go
and
lock
your
account
until
you
change
your
password
again
with
your
log.
A
If
you're
trying
to
log
on
to
Cori
and
you've
had
problems
trying
to
remember
exactly
what
your
password
it
is
or
you
have
your
caps
lock
down
and
the
password
gets
munched
up,
you
have
five
tries
to
get
it
correct
before
you
locked
out.
However,
the
nice
thing
is,
if
you
do
actually
remember
what
your
password
is,
you
can
log
in
to
NIMH
that
will
clear
the
login
failures
for
Cory
and
then
you
can
go
back
and
log
in
correctly
password
rules.
A
We
require
that
you
have
at
least
eight
characters
in
your
password
and
those
characters
have
to
be
composed
of
uppercase
and
lowercase
letters,
a
number
or
more
and
one
or
more
special
characters.
We
have
a
few
examples
here
of
some
good
passwords
and
a
bad
password
and
then
a
little
hint
on
creating
your
own
password.
A
If
you
select
a
phrase
like
computer
security
is
very
important
for
nurse
users
and
you
take
the
first
letter
of
each
one
of
those
words
compose
a
little
phrase
out
of
it
and
then
munch
up
the
characters
so
that
they
meet
the
required
upper
lower
case
number
of
special
characters.
You
have
a
fairly
good
password,
or
at
least
we
used
to
think
so
and
that's
another
story.
A
A
Something
like
that,
you
probably
want
to
set
that
up
either
on
your
laptop,
your
desktop
your
phone
before
you
create
the
token,
because
once
you
do
create
the
token
in
them,
you
get
a
one-time
picture
of
a
QR
code
or
whatever
secret
phrase.
You
need
to
put
into
some
software
to
get
the
to
to
link
up
so
that
the
one-time,
password
generator,
can
create
your
OTP
or
MFA
OTP
one-time
password.
A
Well,
so
have
a
link
here
that
takes
you
to
the
page
on
our
website
our
main
website
on
how
to
go
through
this
whole
process
of
setting
up
the
factor.
Authentication-
and
this
is
that
picture-
that
I
was
speaking
of
QR
code
after
this
person
created
their
token.
If
you
have
a
phone,
you
can
just
take
a
picture
of
it.
If
you
have
software
on
a
desktop,
you
have
to
copy
this
secret.
That's
redacted
here
for
some
reason
put
that
into
the
software
and
to
link
everything
together.
A
Not
anymore
so
before
we
went
to
multi-factor
authentication,
we
used
to
allow
you
to
put
in
your
public
SSH
key
and
if
those
would
get
pushed
out
to
the
computers
so
that
you
could
use
SSH
to
log
in,
but
now
that
we've
gone
to
the
MFA,
that
is
really
doesn't
do
any
good
any
more.
You
can
put
it
in
there
if
you
want,
but
it
makes
you
feel
better.
A
A
Some
justification
for
those
types
of
resources
and
such
all
of
the
requests
are
reviewed
by
the
DOA
office
of
science
program
allocation
managers.
The
renewal
process
is
kind
of
strung
out
because
our
allocation
year
starts
in
January,
but
we
have
to
get
all
this
done
beforehand
to
get
through
the
whole
approval
process,
and
then
the
awards
for
the
projects
are
announced,
usually
in
December.
A
A
Even
with
the
comings
and
goings
of
the
different
computers,
we
have
about
nine
point
to
three
billion
hours
that
we
allocate
every
year
or
at
least
for
this
year.
Eighty
percent
of
that
time
is
set
aside
specifically
for
the
deal
we
office,
the
science
programs
to
use
and
allocate
for
their
different
projects.
A
Ten
percent
goes
to
the
Oscar
leadership
computing
challenge,
which
has
it
has
a
start
time
of
July
and
then
runs
through
June
of
the
next
year.
The
request
for
the
al-sisi
projects
has
done
through
a
different
request
process
and
they
just
tell
us
who
gets
the
awards,
and
then
we
have
a
10%,
that's
used
by
what
we
call
the
directors
reserve.
That's
for,
like
our
internal
projects,
like
nice,
app
and
also
for
education
and
staff
use.
A
So
we
encourage
people
to
use
their
plan
out
the
usage
of
their
computing
time
throughout
the
year.
Don't
wait
until
the
last
minute
and
in
December
to
try
and
get
all
your
time
used
up
and
because
what
we
do
is
we
every
quarter.
We
have
what
we
call
quarterly
reductions,
allocation
reductions,
we'll
look
at
how
much
was
allocated
the
project,
how
much
they've
used
by
a
certain
point
of
time.