Changes between Version 6 and Version 7 of GENIFAQ
- Timestamp:
- 07/14/13 22:15:51 (11 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
GENIFAQ
v6 v7 19 19 GENI experimenter tools use secure [http://xmlrpc.scripting.com XML RPC] for invoking methods on GENI Aggregates. Your certificate is used by these aggregates to verify you have the privileges needed to perform operations such as allocating resources on these aggregates. 20 20 21 Aggregates that provide you with compute resources typically allow you to log into these resources using the [http://en.wikipedia.org/wiki/Secure_Shell Secure Shell (ssh)] protocol. Aggregates typically use private-public key pairs instead of passwords to authenticatelogins. When an aggregate provisions a compute resource and make it available to your slice, it installs your public key on the resource. You must make sure your ssh client is configured to find your corresponding private key when you attempt to log into your compute resources. For more information on setting up your keys and your ssh client, see [wiki:HowTo/LoginToNodes this page].21 Aggregates that provide you with compute resources typically allow you to log into these resources using the [http://en.wikipedia.org/wiki/Secure_Shell Secure Shell (ssh)] protocol. Private-public key pairs instead of passwords are commonly to authenticate ssh logins. When an aggregate provisions a compute resource and make it available to your slice, it installs your public key on the resource. You must make sure your ssh client is configured to find your corresponding private key when you attempt to log into your compute resources. For more information on setting up your keys and your ssh client, see [wiki:HowTo/LoginToNodes this page].