account
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
account [2011/11/03 10:21] – damir | account [2015/07/01 13:45] – external edit 127.0.0.1 | ||
---|---|---|---|
Line 5: | Line 5: | ||
Without an account, you (the user) can't connect to our network, to our servers and to Internet. Even if you are located to the other end of the world and need to access our server for just 1 times, you need an account. | Without an account, you (the user) can't connect to our network, to our servers and to Internet. Even if you are located to the other end of the world and need to access our server for just 1 times, you need an account. | ||
- | Receiving an account means that the systems (the whole computers connected to our network) has a method to recognized | + | Receiving an account means that the systems (the whole computers connected to our network) has a method to recognize |
< | < | ||
- | **Account are created when requested by a Staff member**. These accounts are not kept beyond the end of a project (with 2 month grace). | + | **Account are created |
</ | </ | ||
Line 18: | Line 18: | ||
* Email address (messages from the Sys Admins will be sent to this address) | * Email address (messages from the Sys Admins will be sent to this address) | ||
* Office where the User is located (or Institute from wich the user is connecting) | * Office where the User is located (or Institute from wich the user is connecting) | ||
- | * Lab Affiliation (**ALGO, ARNI, LCM, LICOS, LTHC, LTHI**) | + | * Lab Affiliation (**ALGO, ARNI, LCM, LINX, LTHC, LTHI**) |
* Type of Account requested | * Type of Account requested | ||
* Workstation (the user needs to use a Linux Workstation) | * Workstation (the user needs to use a Linux Workstation) | ||
Line 32: | Line 32: | ||
After the creation of the account, the user will receive his/hers **login** and **password** couple. The login remain fix until the deletion, but the **password must changed at the first login** and changed again at intervals.\\ | After the creation of the account, the user will receive his/hers **login** and **password** couple. The login remain fix until the deletion, but the **password must changed at the first login** and changed again at intervals.\\ | ||
Avoid weak password as | Avoid weak password as | ||
- | * Name of cats, dogs, fishes, turtles, iguanas, parrots, sex toys (of whatsoever nature) | + | * Name of cats, dogs, fishes, turtles, iguanas, parrots and so on |
* Name of parents, siblings or other relatives, even in combined forms | * Name of parents, siblings or other relatives, even in combined forms | ||
- | * Name of Gods or other Divinities | + | * Name of Divinities |
* **names with a number after or before it** | * **names with a number after or before it** | ||
* Dates of birth, death, anniversary of anyone or anything | * Dates of birth, death, anniversary of anyone or anything | ||
Line 43: | Line 43: | ||
<note tip> | <note tip> | ||
- | A good password contain at least 8 chars and has a " | + | A good password contain at least 12 chars and has a " |
</ | </ | ||
<note warning> | <note warning> | ||
**Why it's so important ?**\\ | **Why it's so important ?**\\ | ||
- | Your password can be used to access our network from anywhere in the world, so if someone steal your password hi/her has complete access to our servers. One single weak password means that all users using the local services are susceptible to attack | + | Your password can be used to access our network from anywhere in the world, so if someone steal your password hi/her has complete access to your identity and our servers. One single weak password means that all users using the local services are susceptible to attack.\\ |
Login and Password are the only way a computer can recognize the user, don't share your account with anyone and don't use weak password for your account. | Login and Password are the only way a computer can recognize the user, don't share your account with anyone and don't use weak password for your account. | ||
The passwords are periodically verified and the user that has a weak password is requested to change it. | The passwords are periodically verified and the user that has a weak password is requested to change it. | ||
- | If you're requested to change your password, please do this A.S.A.P., **you can change your network password from anywhere in the world**, just connect to the access server using a ssh protocol and use the passwd command. | + | If you're requested to change your password, please do this A.S.A.P.: **you can change your network password from anywhere in the world**, just connect to the access server using a ssh protocol and use the passwd command. |
</ | </ | ||
- | ===== Wireless Network | + | ===== EPFL Wireless Network ===== |
The account for this network are managed directly by the EPFL, and not by us. The **epfl** wireless network is a facility available to all personnel of the EPFL ([[ http:// | The account for this network are managed directly by the EPFL, and not by us. The **epfl** wireless network is a facility available to all personnel of the EPFL ([[ http:// | ||
Line 69: | Line 69: | ||
</ | </ | ||
- | ===== Wireless Network | + | ===== Public-EPFL |
- | The wireless network **public-epfl** is an open network, accessible to everyone that has an antenna in the [[ http:// | + | The wireless network **public-epfl** is an open network, accessible to everyone that has an antenna in the [[ http:// |
- | The users of wireless network | + | The users of **public-epfl** receive a login and a password from the local Administrators |
** In order to use this kind of connection, after obtaining the account, the users have to: ** | ** In order to use this kind of connection, after obtaining the account, the users have to: ** | ||
- Connect to the network __public-epfl__ | - Connect to the network __public-epfl__ | ||
- Open the Web browser | - Open the Web browser | ||
+ | - Connect to the En-Clair link | ||
- Insert the login/ | - Insert the login/ | ||
- Click the "I Agree" button | - Click the "I Agree" button | ||
- | If everything is correct, the user can have access to internet and can use most of the protocols available. | + | If everything is correct, the user will have access to internet and will be able to use most of the protocols available. |
<note tip> | <note tip> | ||
- | Users of **public-epfl** can connect to our network and use the local account to access servers (via ssh) or to [[printing: | + | Users of **public-epfl** can connect to our network and use the local account to access servers (via ssh) or to [[printing: |
</ | </ | ||
- | ===== Configue your laptop ===== | + | |
- | At [[http:// | + |