User Tools

Site Tools


account

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
account [2011/11/03 10:21] damiraccount [2015/07/01 13:45] – external edit 127.0.0.1
Line 5: Line 5:
  
 Without an account, you (the user) can't connect to our network, to our servers and to Internet. Even if you are located to the other end of the world and need to access our server for just 1 times, you need an account. Without an account, you (the user) can't connect to our network, to our servers and to Internet. Even if you are located to the other end of the world and need to access our server for just 1 times, you need an account.
-Receiving an account means that the systems (the whole computers connected to our network) has a method to recognized you and let you login, this also means that your account (login/password couple) are extremely important and you have to take care of it.+Receiving an account means that the systems (the whole computers connected to our network) has a method to recognize you and let you login, this also means that your account (login/password couple) are extremely important and you have to take care of it.
  
 <note> <note>
-**Account are created when requested by a Staff member**. These accounts are not kept beyond the end of a project (with 2 month grace).+**Account are created only when requested by a Staff member**. These accounts are not kept beyond the end of a project (with 2 month grace).
 </note> </note>
  
Line 18: Line 18:
   * Email address (messages from the Sys Admins will be sent to this address)   * Email address (messages from the Sys Admins will be sent to this address)
   * Office where the User is located (or Institute from wich the user is connecting)   * Office where the User is located (or Institute from wich the user is connecting)
-  * Lab Affiliation (**ALGO, ARNI, LCM, LICOS, LTHC, LTHI**)+  * Lab Affiliation (**ALGO, ARNI, LCM, LINX, LTHC, LTHI**)
   * Type of Account requested   * Type of Account requested
     * Workstation (the user needs to use a Linux Workstation)     * Workstation (the user needs to use a Linux Workstation)
Line 32: Line 32:
 After the creation of the account, the user will receive his/hers **login** and **password** couple. The login remain fix until the deletion, but the **password must changed at the first login** and changed again at intervals.\\ After the creation of the account, the user will receive his/hers **login** and **password** couple. The login remain fix until the deletion, but the **password must changed at the first login** and changed again at intervals.\\
 Avoid weak password as Avoid weak password as
-  * Name of cats, dogs, fishes, turtles, iguanas, parrots, sex toys (of whatsoever nature) and so on+  * Name of cats, dogs, fishes, turtles, iguanas, parrots and so on
   * Name of parents, siblings or other relatives, even in combined forms   * Name of parents, siblings or other relatives, even in combined forms
-  * Name of Gods or other Divinities+  * Name of Divinities
   * **names with a number after or before it**   * **names with a number after or before it**
   * Dates of birth, death, anniversary of anyone or anything   * Dates of birth, death, anniversary of anyone or anything
Line 43: Line 43:
  
 <note tip> <note tip>
-A good password contain at least chars and has a "melange" of letters, Capital Letters, number and other chars as in this example: qy7hM462, or 24xi31iQ.+A good password contain at least 12 chars and has a "melange" of letters, Capital Letters, number and other chars as in this example: qy7hM462, or 24xi31iQ.
 </note> </note>
  
 <note warning> <note warning>
 **Why it's so important ?**\\ **Why it's so important ?**\\
-Your password can be used to access our network from anywhere in the world, so if someone steal your password hi/her has complete access to our servers. One single weak password means that all users using the local services are susceptible to attack from hackers.\\+Your password can be used to access our network from anywhere in the world, so if someone steal your password hi/her has complete access to your identity and our servers. One single weak password means that all users using the local services are susceptible to attack.\\
 Login and Password are the only way a computer can recognize the user, don't share your account with anyone and don't use weak password for your account. Login and Password are the only way a computer can recognize the user, don't share your account with anyone and don't use weak password for your account.
 The passwords are periodically verified and the user that has a weak password is requested to change it. The passwords are periodically verified and the user that has a weak password is requested to change it.
-If you're requested to change your password, please do this A.S.A.P.**you can change your network password from anywhere in the world**, just connect to the access server using a ssh protocol and use the passwd command. +If you're requested to change your password, please do this A.S.A.P.**you can change your network password from anywhere in the world**, just connect to the access server using a ssh protocol and use the passwd command. 
 </note>  </note> 
  
-===== Wireless Network "epfl" =====+===== EPFL Wireless Network =====
  
 The account for this network are managed directly by the EPFL, and not by us. The **epfl** wireless network is a facility available to all personnel of the EPFL ([[ http://network.epfl.ch/fr/Access%20at%20campus/WiFi/Zones/| EPFL WiFi ]]) and, after request, even to visitors or invited Professors. The request for this kind of account take some time to be accomplished, so It's useless if the user is visiting for a less than a month. The account for this network are managed directly by the EPFL, and not by us. The **epfl** wireless network is a facility available to all personnel of the EPFL ([[ http://network.epfl.ch/fr/Access%20at%20campus/WiFi/Zones/| EPFL WiFi ]]) and, after request, even to visitors or invited Professors. The request for this kind of account take some time to be accomplished, so It's useless if the user is visiting for a less than a month.
Line 69: Line 69:
 </note> </note>
  
-===== Wireless Network "public-epfl" =====+===== Public-EPFL Wireless Network =====
  
-The wireless network **public-epfl** is an open network, accessible to everyone that has an antenna in the [[ http://network.epfl.ch/fr/Access%20at%20campus/WiFi/Zones/|Epfl Wifi]], no encryption or low level authentication is performed. +The wireless network **public-epfl** is an open network, accessible to everyone that has an antenna in the [[ http://network.epfl.ch/fr/Access%20at%20campus/WiFi/Zones/|Epfl Wifi Zones]], no encryption or low level authentication is performed. 
-The users of wireless network **public-epfl** will receive a login and a password from the local Administrators. Account for this network can be used at most for 30 days. At the expiration the account is automatically deleted and the user must ask for another account.\\+The users of **public-epfl** receive a login and a password from the local Administrators and this account can be used at most for 30 days. At the expiration the account is automatically deleted and the user must ask for another account.\\
 ** In order to use this kind of connection, after obtaining the account, the users have to: ** ** In order to use this kind of connection, after obtaining the account, the users have to: **
   - Connect to the network __public-epfl__   - Connect to the network __public-epfl__
   - Open the Web browser   - Open the Web browser
 +  - Connect to the En-Clair link
   - Insert the login/password in the two fields in the left of the web page   - Insert the login/password in the two fields in the left of the web page
   - Click the "I Agree" button   - Click the "I Agree" button
-If everything is correct, the user can have access to internet and can use most of the protocols available.+If everything is correct, the user will have access to internet and will be able to use most of the protocols available.
  
 <note tip> <note tip>
-Users of **public-epfl** can connect to our network and use the local account to access servers (via ssh) or to [[printing:wireless:public-epfl|print]]. **Computers that connect from this network are coming from Internet**, so only a limited number of server is directly accessible.+Users of **public-epfl** can connect to our network and use the local account to access servers (via ssh) or to [[printing:wireless:public-epfl|print]]. **Computers that connect from this network are coming from Internet**, so only a limited number of server are directly accessible.
 </note> </note>
  
-===== Configue your laptop ===== +
-At [[http://stephan.walter.name/WPA-EAP_authentication_at_EPFL|this]] page you can learn how to configure your laptop for connecting to the wireless **epfl** network.+