ARCHER logo ARCHER banner

The ARCHER Service is now closed and has been superseded by ARCHER2.

  • ARCHER homepage
  • About ARCHER
    • About ARCHER
    • News & Events
    • Calendar
    • Blog Articles
    • Hardware
    • Software
    • Service Policies
    • Service Reports
    • Partners
    • People
    • Media Gallery
  • Get Access
    • Getting Access
    • TA Form and Notes
    • kAU Calculator
    • Cost of Access
  • User Support
    • User Support
    • Helpdesk
    • Frequently Asked Questions
    • ARCHER App
  • Documentation
    • User Guides & Documentation
    • Essential Skills
    • Quick Start Guide
    • ARCHER User Guide
    • ARCHER Best Practice Guide
    • Scientific Software Packages
    • UK Research Data Facility Guide
    • Knights Landing Guide
    • Data Management Guide
    • SAFE User Guide
    • ARCHER Troubleshooting Guide
    • ARCHER White Papers
    • Screencast Videos
  • Service Status
    • Detailed Service Status
    • Maintenance
  • Training
    • Upcoming Courses
    • Online Training
    • Driving Test
    • Course Registration
    • Course Descriptions
    • Virtual Tutorials and Webinars
    • Locations
    • Training personnel
    • Past Course Materials Repository
    • Feedback
  • Community
    • ARCHER Community
    • ARCHER Benchmarks
    • ARCHER KNL Performance Reports
    • Cray CoE for ARCHER
    • Embedded CSE
    • ARCHER Champions
    • ARCHER Scientific Consortia
    • HPC Scientific Advisory Committee
    • ARCHER for Early Career Researchers
  • Industry
    • Information for Industry
  • Outreach
    • Outreach (on EPCC Website)

You are here:

  • ARCHER
  • User Guides & Documentation
  • Essential Skills
  • Quick Start Guide
  • ARCHER User Guide
  • ARCHER Best Practice Guide
  • Scientific Software Packages
  • UK Research Data Facility Guide
  • Knights Landing Guide
  • Data Management Guide
  • SAFE User Guide
  • ARCHER Troubleshooting Guide
  • ARCHER White Papers
  • Screencast Videos

Contact Us

support@archer.ac.uk

Twitter Feed

Tweets by @ARCHER_HPC

ISO 9001 Certified

ISO 27001 Certified

Logging On to ARCHER

This guide covers requesting a new ARCHER password via SAFE, retrieving the new password once set, setting up an SSH key pair, and using the combination to log on to ARCHER.

When the ARCHER Service was resumed following the worldwide security issue in summer 2020, both ssh key pair (protected by a passphrase) and password are required to log on.

Users are required to use an academic email address i.e. one that ends .ac.uk or for commercial users, an email address using the domain of their company. Users currently using e.g. a gmail, yahoo or similar address must first update their email address in SAFE. If you do not have access to an academic or professional email address, please contact the service desk for advice.

Access to ARCHER is restricted only to users with an .ac.uk email domain - users with other email domains should contact the service desk to arrange approval of their email address.

  1. Log in to SAFE
  2. Request a new machine account password
  3. Generate an SSH key
    • 3.1 Generate an SSH key on MacOS or Linux
    • 3.2 Generate an SSH key on Windows using MobaXterm or PuTTYgen
    • 3.3 Generate an SSH key on Windows using OpenSSH in Powershell
  4. Upload the SSH key via SAFE
  5. Collect your ARCHER password
  6. Connect to ARCHER
  • ssh Debugging guide

1. Log in to SAFE

1.1 Log in to SAFE when you know all your details

    Play video
  1. Go to the SAFE https://www.archer.ac.uk/safe/
  2. (if you have forgotten your SAFE password, go here)
  3. Type in the email address you have registered with
  4. Type in your SAFE password
  5. Click "Login"
  6. You are now on the Main Page and here you can see Menus along the top which give access to SAFE functionality

1.2 How to request a new SAFE password

Note: there is no requirement to reset you SAFE password due to the recent security incident - this step is only necessary if you have forgotten your SAFE password.

Go to https://www.archer.ac.uk/safe/. Then:

    Play video
  1. Click Forgot password?
  2. Enter your email address
  3. SAFE will mail you a link - when you click on the link you will be able to set a new SAFE password

Of course, anyone could go to SAFE, type your email address and request a new password by clicking "Forgot password?". If that happens you will receive an email message out of the blue with a link to change the password - if you don't click the link then no changes will be made.

1.3 How to change your SAFE password

Note: there is no requirement to reset you SAFE password due to the recent security incident - this step is only necessary if you have forgotten your SAFE password.

Login to SAFE. Then:

    Play video
  1. Go to the Menu Your details and select Change SAFE password
  2. Fill in the boxes and click Change

1.4 How to find out which email address you have registered for SAFE

If you have forgotten which email address you used to register for SAFE, you should contact the service desk and state the machine username and details of your institution. The helpdesk can then trigger a new password request to the email you used to register.

1.5 How to change your email address on SAFE

Login to SAFE. Then:

    Play video
  1. Go to the Menu Your details and select Update email
  2. Enter the new email address and click Request

A verification email will then be sent to the new email address. This email contains a link which you must use to verify your new address. On acknowledging your new address the change will be committed and you must use the new email address when logging into SAFE

1.6 What if you no longer have access to the email address registered in SAFE

If you have changed email addresses since you last used SAFE and no longer have access to your old email account, and no longer remember your SAFE password, please contact the service desk and give them the details of your username, previous and current institutions and a contact phone number.

They will be able to update your details in SAFE. Please do not just sign up for a new SAFE account as this will not be linked to your existing machine accounts.

2. Request a new machine account password

Login to SAFE. Then:

    Play video
  1. Go to the Menu Login accounts and select the account you need the new password for
  2. which displays details of this service machine account.
  3. Click Request Password Reset
  4. towards the bottom of the screen.

Now the systems team will change your password. When this has been done, you will be informed by email; this means that you can come back to SAFE and pick up your new password.

While you are waiting for your new password, you can setup your SSH key pair and upload the public key to SAFE. We describe how to do this in the next section.

3. Generate an SSH key pair protected by a passprase

An SSH key pair is an additional method of authentication that consists of two parts (hence "key pair"):

  • A private key (or identification) which is protected by a passphrase. This should be kept safe and never shared with anyone else or uploaded to any type of shared or online storage.
  • A public key which is uploaded to the remote systems you want to access (in the case of ARCHER this will be uploaded via the SAFE, see below).

How you generate your SSH key pair depends on which operating system you use on your laptop/workstation that you are using to access ARCHER. We provide three sets of instructions below: for macOS/Linux, for Windows using MobaXterm (should work for all versions of Windows) and for Windows using Powershell (this method will only work on recent versions of Windows 10).

  • 3.1 Generate an SSH key pair on MacOS or Linux
  • 3.2 Generate an SSH key pair on Windows using MobaXterm or PuTTYgen
  • 3.3 Generate an SSH key pair on Windows using OpenSSH in Powershell

3.1 Generate an SSH key pair on MacOS or Linux

3.1.1. Open your terminal application.

On macOS this is the "Terminal" application found from the Applications menu or via Spotlight search. On Linux, you should use the flavour of terminal for your distribution (for example, on Ubuntu, it is an application called "Terminal").

3.1.2. Generate a key pair

In the terminal, use the "ssh-keygen" command to generate a key pair. We will add options to set the type of the key pair to RSA, increase the cryptographic strength of the key pair to 4096 bits and to add a comment to the key pair to aid identification in the future. For example:

ssh-keygen -t rsa -b 4096 -C "ARCHER access"
3.1.3. Give your key a filename

Press "Return/Enter" to accept the default.

Enter file in which to save the key (/Users/auser/.ssh/id_rsa):
3.1.4. You will be asked to enter a passphrase.

Choose a strong passphrase. See advice at NCSC. (Do not be tempted to accept no passphrase as this will make your ARCHER account insecure.) Note: you will not see any characters appear in the terminal as you type your passphrase.

Enter passphrase (empty for no passphrase): 
Enter same passphrase again:
3.1.5. Once you have chosen your passphrase

You should see output similar to:

Your identification has been saved in /Users/auser/.ssh/id_rsa.
Your public key has been saved in /Users/auser/.ssh/id_rsa.pub.
The key fingerprint is:
SHA256:MW+/4eW9KUBtTwO8884PQanjZ1nOsHENoNQclGl5CnI ARCHER access
The key's randomart image is:
+---[RSA 4096]----+
|          .+==   |
|        ..E.B+.. |
|        oo.o.o*  |
|         + ..B +.|
|        S + + O =|
|         . + . & |
|            = X o|
|           . O =.|
|            o oo=|
+----[SHA256]-----+

The public key file, in this case "/Users/auser/.ssh/id_rsa.pub" is the part that you will upload to SAFE to associate with your ARCHER machine account (see the Upload public key to SAFE section below). Remember: your private key should never be shared with anyone else or uploaded to any type of shared or online storage.

3.2 Generate an SSH key pair on Windows using MobaXterm or PuTTYgen

Play video

Note that PuTTYgen uses an amost identical interface to MobaKeyGen
and can also be use to generate the SSH key pair.

3.2.1. Generating a Public/Private key pair

To generate an SSH key pair, start the MobaXterm SSH Key Generator (MobaKeyGen) found under the MobaXterm Tools menu, or start PuTTYgen.

  • MobaKeyGen MobaKeyGen

 

Under 'type of key to generate' select RSA. We HIGHLY recommend you change the "Number of bits in a generated key:" from the default of 2048 to 4096 (last option at the bottom of the GUI). Then click the Generate button and move your mouse around the empty area at the top of the GUI. As you move your mouse around, you'll see the bar move across the window indicating it's working on generating your random, unique key.

  • MobaKeyGen MobaKeyGen

 

3.2.2. Save the generated keys.

You should enter a passphrase for your private key in the "Key passphrase" box. Choose a strong passphrase. See advice at NCSC or you can use a full sentence (Do not be tempted to accept no passphrase as this will make your ARCHER account insecure.) This ensures that if your key is stolen, somebody else would need the passphrase associated with the key to utilize it.

Changing the default "Key comment" will help you to identify the key later.

Then click "Save public key" and then "Save private key" - the file location of the private key MUST be a place that only you have access to. Remember: your private key should never be shared with anyone else or uploaded to any type of shared or online storage. Be aware: the default location is often the Windows Documents folder - this is often set to auto-backup to One Drive so this is NOT a good location for your private key.

  • MobaKeyGen MobaKeyGen

 

IMPORTANT: Make sure to save the private key with an extension of .ppk - if you don't this won't work when trying to connect using MobaXterm.

If you want to paste the public key into SAFE for upload to ARCHER then you should use right-click "Select all" and then right-click "Copy" to ensure you capture the entire key string.

  • MobaKeyGen MobaKeyGen

 

Now edit the MobaXterm session for your ARCHER connection, and add the private key into MobaXterm by selecting "Advanced SSH settings", tick Use private key and navigate to the private key file you saved.

  • MobaKeyGen MobaKeyGen

 

For PuTTy / PuTTYGen, in PuTTY go to SSH Auth to add the private key.

  • PuttyGen PuttyGen

 

3.3 Generate an SSH key pair on Windows using OpenSSH in Powershell

Play video

OpenSSH was added to Windows 10 in 2018.
if the Windows version is more recent than this then
keys can be created and shared from PowerShell with just a few commands

Before starting, check that the "ssh-keygen" command is available in PowerShell.

Use the command 'Get-command' e.g.

Get-command ssh-keygen

You should see

CommandType     Name                                               Version    Source

-----------     ----                                               -------    ------
Application     ssh-keygen.exe                                     7.7.2.1    C:\WINDOWS\System32\OpenSSH\ssh-keygen.exe 
3.3.1. Generate an SSH key pair

Use the "ssh-keygen" command to generate a key pair. We will add options to set the type of the key pair to RSA, increase the cryptographic strength of the key pair to 4096 bits and to add a comment to the key pair to aid identification in the future:

ssh-keygen -t rsa -b 4096 -C "ARCHER access"

This will ask you for filename for the key: press "Return/Enter" to accept the default.

  Enter file in which to save the key (C:\Users\Jane Doe/.ssh/example_key):

You will then be asked to enter a passphrase.

Choose a strong passphrase. See advice at NCSC or you can use a full sentence (Do not be tempted to accept no passphrase as this will make your ARCHER account insecure.) Note: you will not see any characters appear in the terminal as you type your passphrase.

Enter passphrase (empty for no passphrase): 
Enter same passphrase again:
3.3.2. You should see output similar to:
Your identification has been saved in C:\Users\Jane Doe/.ssh/example_key. 
Your public key has been saved in C:\Users\Jane Doe/.ssh/example_key.pub. 
The key fingerprint is:
SHA256:vw0ieJ5nxHcl8HzQXjD5tv9pEzKcozOC/r5ZgpWaT24 ARCHER access 
The key's randomart image is: 

+---[RSA 2048]----+ 
|             .oo | 
|          . . o..| 
|           + o o | 
|          . + + o| 
|       .So  .+...| 
|     .  B.. .* o | 
|    . o=o+oo. + o| 
|     o +*E+B   oo| 
|      +++B+ + ..+| 
+----[SHA256]-----+ 

The public key file, in this case "C:\Users\Jane Doe/.ssh/example_key.pub" is the part that you will upload to SAFE to associate with your ARCHER machine account (see the Upload public key to SAFE section below). Remember: your private key should never be shared with anyone else or uploaded to any type of shared or online storage.

4. Upload the SSH key via SAFE

  1. Login to SAFE at: https://www.archer.ac.uk/safe/
  2. Go to the Menu Your details
  3. Click Update personal details near bottom of page
  4. Paste the public key string into the SSH Public key field
    (the key string is in your public key file and starts "ssh-rsa..." and you must select and copy ALL of it - use right-click 'Select All' to be sure)
  5. Click Update button bottom right to trigger the upload of the public key to ARCHER. (SAFE will verify the key format when it is imported. If SAFE gives an error for the format of the key, check you selected all of the key before pasting into the text box or that you have selected the correct file.)

The upload of the SSH public key does require manual intervention by the systems team so please allow a short while (about 10-20 minutes at least) before you try to log on. No confirmation is sent for this, so you don't need to wait for an email. You cannot upload a new SSH public key until any earlier upload request has been completed.

  • MobaKeyGen MobaKeyGen

 

5. Collect your ARCHER password

Wait until you have received the email confirming that your new password has been set by our systems team; if you try to retrieve it before they have sent the email, the password you retrieve will be an old, expired one.

  1. Login to SAFE at: https://www.archer.ac.uk/safe/
  2. Go to the Menu Login accounts and select the account you need the new password for
  3. Click View Login Account Password
  4. towards the bottom of the screen.
  5. This will display your password as set by the systems team.

This password is generated randomly by software. It's best to copy-and-paste it across when you log in to the service machine (ARCHER).

6. Connect to ARCHER

Start your connection to ARCHER using whichever ssh method you usually use - often
this is Terminal on MacOS or Linux, and MobaXTerm or Putty for Windows

Play video

You will be prompted to enter the passphrase for your SSH Key

Once the SSH key passprase has been accepted then you will be prompted to enter your password, as retrieved from SAFE

Next, you will be prompted to change your password from the one you retrieved from SAFE. This is a three-step process:

  1. When promoted to enter your ldap password: Re-enter the password you retrieved from SAFE
  2. When prompted to enter your new password: type in a new password which meets the password complexity requirements
  3. When prompted to re-enter the new password: re-enter the new password

Important: Do NOT re-use an old previously used password here. All the old passwords may have been compromised.

Note: when you change your password on the service machine in this way, this is not reflected on the SAFE. If you try to retrieve your password in SAFE again, it will still be the old, now defunct, auto-generated one.

You are now logged on to ARCHER

In future when you log on you will be prompted first for the SSH Key passprase and then for your password (that you set above)

SSH debugging tips

If you find you are unable to connect via SSH there are a number of ways you can try and diagnose the issue. Some of these are collected below - if you are having difficulties connecting we suggest trying these before contacting the ARCHER service desk. Can you connect to the login node?

Try the command ping -c 3 login.archer.ac.uk . If you successfully connect to the login node, the output should include:

--- login.dyn.archer.ac.uk ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 38ms

(the ping time ‘38ms’ is not important). If not all packets are received there could be a problem with your internet connection, or the login node could be unavailable.

SSH key

If you get the error message Permission denied (publickey) this can indicate a problem with your SSH key. Some things to check:

  • Have you uploaded the key to SAFE? Please note that if the same key is reuploaded SAFE will not map the “new” key to ARCHER. If for some reason this is required, please delete the key first, then reupload.
  • Is ssh using the correct key? You can check which keys are being found and offered by ssh using ssh -vvv. If your private key has a non-default name you can use the -i flag to provide it to ssh, i.e. ssh -i path/to/key username@login.archer.ac.uk.
  • Are you entering the passphrase correctly? You will be asked for your private key’s passphrase first. If you enter it incorrectly you will usually be asked to enter it again, and usually up to three times in total, after which ssh will fail with Permission denied (publickey). If you would like to confirm your passphrase without attempting to connect, you can use ssh-keygen -y -f /path/to/private/key. If successful, this command will print the corresponding public key. You can also use this to check it is the one uploaded to SAFE.
  • Are permissions correct on the ssh key? One common issue is that the permissions are incorrect on the either the key file, or the directory it’s contained in. On Linux/MacOS for example, if your private keys are held in ~/.ssh/ you can check this with ls -al ~/.ssh. This should give something similar to the following output:

        $ ls -al ~/.ssh/
        drwx------.  2 user group    48 Jul 15 20:24 .
        drwx------. 12 user group  4096 Oct 13 12:11 ..
        -rw-------.  1 user group   113 Jul 15 20:23 authorized_keys
        -rw-------.  1 user group 12686 Jul 15 20:23 id_rsa
        -rw-r--r--.  1 user group  2785 Jul 15 20:23 id_rsa.pub
        -rw-r--r--.  1 user group  1967 Oct 13 14:11 known_hosts

The important section here is the string of letters and dashes at the start, for the lines ending in ., id_rsa, and id_rsa.pub, which indicate permissions on the containing directory, private key, and public key respectively. If your permissions are not correct, they can be set with chmod. Consult the table below for the relevant chmod command. On Windows, permissions are handled differently but can be set by right-clicking on the file and selecting Properties > Security > Advanced. The user, SYSTEM, and Administrators should have Full control, and no other permissions should exist for both public and private key files, and the containing folder.

Target Permissions chmod Code
Directory drwx------ 700
Private Key -rw------- 600
Public Key -rw-r--r-- 644

chmod can be used to set permissions on the target in the following way:
chmod [code] [target]. So for example to set correct permissions on the private key file id_rsa_ARCHER one would use the command chmod 600 id_rsa_ARCHER.

Note

Unix file permissions can be understood in the following way. There are three groups that can have file permissions: (owning) users, (owning) groups, and others. The available permissions are read, write, and execute. The first character indicates whether the target is a file -, or directory d. The next three characters indicate the owning user's permissions. The first character is r if they have read permission, - if they don't, the second character is w if they have write permission, - if they don't, the third character is x if they have execute permission, - if they don't. This pattern is then repeated for group, and other permissions. For example the pattern -rw-r--r-- indicates that the owning user can read and write the file, members of the owning group can read it, and anyone else can also read it. The chmod codes are constructed by treating the user, group, and owner permission strings as binary numbers, then converting them to decimal. For example the permission string -rwx------ becomes 111 000 000 -> 700.

Password

If you are having trouble entering your password consider using a password manager, from which you can copy and paste it. This will also help you generate a secure password. If you need to reset your password, instructions for doing so can be found here.

Windows users please note that Ctrl+V does not work to paste in to PuTTY, MobaXterm, or PowerShell. Instead use Shift+Ins to paste. Alternatively, right-click and select ‘Paste’ in PuTTY and MobaXterm, or simply right-click to paste in PowerShell.

SSH verbose output

Verbose debugging output from ssh can be very useful for diagnosing the issue. In particular, it can be used to distinguish between problems with the SSH key and password - further details are given below. To enable verbose output add the -vvv flag to your SSH command. For example:

ssh -vvv username@login.archer.ac.uk

The output is lengthy, but somewhere in there you should see lines similar to the following:

debug1: Next authentication method: publickey
debug1: Offering public key: RSA SHA256: 
debug3: send_pubkey_test
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 60
debug1: Server accepts key: pkalg ssh-rsa vlen 2071
debug2: input_userauth_pk_ok: fp SHA256:
debug3: sign_and_send_pubkey: RSA SHA256:
Enter passphrase for key '':
debug3: send packet: type 50
debug3: receive packet: type 51
Authenticated with partial success.

Most importantly, you can see which files ssh has checked for private keys, and you can see if any key is accepted. The line Authenticated with partial success indicates that the SSH key has been accepted, and you will next be asked for your password. By default ssh will go through a list of standard private key files, as well as any you have specified with -i or a config file. This is fine, as long as one of the files mentioned is the one that matches the public key uploaded to SAFE.

If you do not see Authenticated with partial success anywhere in the verbose output, consider the suggestions under SSH key above. If you do, but are unable to connect, consider the suggestions under Password above.

The equivalent information can be obtained in PuTTY or MobaXterm by enabling all logging in settings.

Copyright © Design and Content 2013-2019 EPCC. All rights reserved.

EPSRC NERC EPCC