| 16 | |
| 17 | == Topics of Special Interest to Experimenters == |
| 18 | '''1. Why do I need certificates and keys?''' |
| 19 | GENI experimenter tools use secure [http://xmlrpc.scripting.com XML RPC] for invoking methods on GENI Aggregates. Your certificate is used by these aggregates to verify you have the privileges needed to perform operations such as allocating resources on these aggregates. |
| 20 | |
| 21 | Aggregates that provide you with compute resources typically allow you to log into these resources using the [http://en.wikipedia.org/wiki/Secure_Shell Secure Shell (ssh)] protocol. Aggregates typically use private-public key pairs instead of passwords to authenticate logins. When an aggregate provisions a compute resource and make it available to your slice, it installs your public key on the resource. You must make sure your ssh client is configured to find your corresponding private key when you attempt to log into your compute resources. For more information on setting up your keys and your ssh client, see [wiki:HowTo/LoginToNodes this page]. |