further fixes
This commit is contained in:
@@ -97,7 +97,7 @@ As of 2022-04-14 a secure token is required to interact with the data catalog. T
|
||||
1. You should be redirected to your user settings and see a 'User Information' section. If not, click on1. your username in the top right and choose 'Settings' from the menu.
|
||||
1. Look for the field 'Catamel Token'. This should be a 64-character string. Click the icon to copy the1. token.
|
||||
|
||||

|
||||

|
||||
|
||||
You will need to save this token for later steps. To avoid including it in all the commands, I suggest saving it to an environmental variable (Linux):
|
||||
|
||||
|
||||
@@ -50,7 +50,7 @@ klist
|
||||
krenew
|
||||
```
|
||||
* Keep in mind that the maximum lifetime for granting tickets is 7 days, therefore `krenew` can not be used beyond that limit,
|
||||
and then `kinit** should be used instead.
|
||||
and then `kinit` should be used instead.
|
||||
|
||||
|
||||
## Obtanining granting tickets with keytab
|
||||
@@ -101,7 +101,7 @@ aklog
|
||||
|
||||
## Slurm jobs accessing AFS
|
||||
|
||||
Some jobs may require to access private areas in AFS. For that, having a valid [**keytab**](#generating-granting-tickets-with-keytab) file is required.
|
||||
Some jobs may require to access private areas in AFS. For that, having a valid [**keytab**](#obtaining-granting-tickets-with-username-and-password) file is required.
|
||||
Then, from inside the batch script one can obtain granting tickets for Kerberos and AFS, which can be used for accessing AFS private areas.
|
||||
|
||||
The steps should be the following:
|
||||
|
||||
@@ -45,7 +45,7 @@ the following fields:
|
||||
* **Protocol**: specify the protocol that will be used for the connection. *Recommended* protocol: **`NX`**
|
||||
* **Port**: Specify the listening port of the **front-end**. It must be **`4000`**.
|
||||
|
||||

|
||||

|
||||
|
||||
#### Configuring NoMachine Authentication Method
|
||||
|
||||
@@ -62,19 +62,19 @@ session if none exists.
|
||||
If there are existing sessions, instead of opening a new desktop session, users can reconnect to an
|
||||
existing one by clicking to the proper icon (see image below).
|
||||
|
||||

|
||||

|
||||
|
||||
Users can also create a second desktop session by selecting the **`New Desktop`** button (*red* rectangle in the
|
||||
below image). This will create a second session on the second login node, as long as this node is up and running.
|
||||
|
||||

|
||||

|
||||
|
||||
### NoMachine LightDM Session Example
|
||||
|
||||
An example of the NoMachine session, which is based on [LightDM](https://github.com/canonical/lightdm)
|
||||
X Windows:
|
||||
|
||||

|
||||

|
||||
|
||||
## Accessing Merlin6 NoMachine from outside PSI
|
||||
|
||||
|
||||
Reference in New Issue
Block a user