|Search Fields (at least one required):|
|XSEDE Gateway Submit Attributes Vendor Software XSEDE|
XSEDE command line tool to record in XCDB the gateway user who ran a job on a resource under a community account.
|XSEDE Resource Identity (xdresourceid) Vendor Software XSEDE|
XSEDE local resource identifier tool
|XSEDE Data Transfer Logging Vendor Software XSEDE|
XSEDE data transfer configuration.
|XSEDE CA Certificate Installer Vendor Software XSEDE|
XSEDE Accepted Certificate Authority (CA) configuration installer
|XSEDE Common User Environment (CUE) Vendor Software XSEDE|
XSEDE Operations and User Services groups recommend implementation of the cue-login-env module by SPs with XRAC allocated resources (at any SP Level). This module will provide variables containing resource information (e.g. hostname), reference location information (e.g. URLs to documentation, paths to community spaces) as well as defining the user's Home, Work & Scratch directories and other file spaces.
|XSEDE-Compatible Basic Cluster (XCBC) Vendor Software XSEDE|
The XSEDE-Compatible Basic Cluster (XCBC) software toolkit enables campus CI resource administrators to build a local cluster from scratch, which is then easily interoperable with XSEDE-supported CI resources. XCBC is very simple in concept: pull the lever, have a cluster built for you complete with an open source resource manager / scheduler and all of the essential tools needed to run a cluster, and have those tools set in place in ways that mimic the basic setup on an XSEDE-supported cluster . The XCBC is based on the OpenHPC project, and consists of XSEDE -developed Ansible playbooks and templates designed to ease the work required to build a cluster. Consult the XSEDE Knowledge Base for complete information about how to use XCBC to set up a cluster.
|XSEDE National Integration Toolkit (XNIT) Vendor Software XSEDE|
Suppose you already have a cluster that you are happy with and you want to add too it software tools that will allow users to use open sources software like that on XSEDE, or other particular pieces of software that you think are important, but you don't want to blow up your cluster to add that capability? XNIT is for you. You can add all of the basic software that is in SCBC, as relocatable RPMs (Resource Package Manger), via a YUM repo . (YUM Stands for Yellowdog Updater, Modified). The RPMs in XNIT allow you to expand the functionality of your cluster, in ways that mimic the setup on an XSEDE cluster. XNIT packages include specific scientific, mathematical, and visualization applications that have been useful on XSEDE systems. Systems administrators may pick and choose what they want to add to their local cluster ; updates may be configured to run automatically or manually. Currently the XNIT repository is available for x86_64 systems running CentOS 6 or 7. Consult the XSEDE Knowledge Base for more information.
|XSEDE Software and Service Availability Repository Vendor Software XSEDE|
Repository of XSEDE operated software and services.
|XSEDE Software Copyright and Licensing Guidance and Template Vendor Software XSEDE|
XSEDE Software Copyright and Licensing Guidance and Template Files
|XSEDE Central Database (XCDB) Vendor Software XSEDE|
XSEDE central resource accounting and user database
|XSEDE Information CLI (xdinfo) Vendor Software XSEDE|
XSEDE information services command line query tool
|XSEDE Allocation Usage Lookup (xdusage) Vendor Software XSEDE|
XSEDE allocation usage lookup command line client
|Globus Toolkit GridFTP Service Vendor Software|
Globus Toolkit GridFTP Services
|Information Services Vendor Software XSEDE|
XSEDE Information Services (IS)
|Genesis II Vendor Software|
Genesis II distributed computing platform
|Kerberos Vendor Software|
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free implementation of this protocol is available from the Massachusetts Institute of Technology. Kerberos is available in many commercial products as well.
|MyProxy Vendor Software NCSA|
MyProxy is open source software for managing X.509 Public Key Infrastructure (PKI) security credentials (certificates and private keys). MyProxy combines an online credential repository with an online certificate authority to allow users to securely obtain credentials when and where needed. Users run myproxy-logon to authenticate and obtain credentials, including trusted CA certificates and Certificate Revocation Lists (CRLs).
Storing credentials in a MyProxy repository allows users to easily obtain RFC 3820 proxy credentials, without worrying about managing private key and certificate files. They can use MyProxy to delegate credentials to services acting on their behalf (like a grid portal) by storing credentials in the MyProxy repository and sending the MyProxy passphrase to the service. They can also use MyProxy to renew their credentials, so, for example, long-running jobs don't fail because of expired credentials. A professionally managed MyProxy server can provide a more secure storage location for private keys than typical end-user systems. MyProxy can be configured to encrypt all private keys in the repository with user-chosen passphrases, with server-enforced policies for passphrase quality. By using a proxy credential delegation protocol, MyProxy allows users to obtain proxy credentials when needed without ever transferring private keys over the network.
For users that don't already have PKI credentials, the MyProxy Certificate Authority (CA) provides a convenient method for obtaining them. The MyProxy CA issues short-lived session credentials to authenticated users. The repository and CA functionality can be combined in one service or can be used separately.
MyProxy provides a set of flexible authentication and authorization mechanisms for controlling access to credentials. Server-wide policies allow the MyProxy administrator to control how credentials may be used. Per-credential policies provide additional controls for credential owners. MyProxy supports multiple authentication mechanisms, including passphrase, certificate, Kerberos, OAuth, SAML, OpenID, Pubcookie, VOMS, PAM, LDAP, RADIUS, SASL, Moonshot, and One Time Passwords (OTP).
|Amber Vendor Software|
Molecular mechanical force fields for the simulation of biomolecules and package of molecular simulation programs
|Globus Sharing Vendor Software|
Globus Data Sharing Service
|Globus Auth ID Explorer Vendor Software|
This is a Web app that allows anyone to explore their Globus identity information. It is intended to be deployed on a public Web server so that one can connect to it using a Web browser, login, see the data that Globus's Auth API provides to the app, and logout. The purpose of the app is to show Web developers what the identity information returned from the Auth API looks like so that they can then write their own apps that use the Auth API.
|Cornell Virtual Workshop Vendor Software|
The Cornell Virtual WorkshopSM learning platform is designed to enhance the computational science skills of researchers, accelerate the adoption of new and emerging technologies, and broaden the participation of underrepresented groups in science and engineering.
|Singularity Container Registry Vendor Software|
Network service deployment of the Singularity Container Registry
|NVIDIA Accelerated Software Registry Vendor Software|
NVIDIA accelerated software registry
|Grid Community Toolkit Vendor Software|
The Grid Community Toolkit (GCT) is an open-source fork by the Grid Community Forum of the venerable Globus Toolkit created by the Globus Alliance. The GCT was created in response to the end-of-support of the Globus Toolkit in January 2018.
|UIUC Research Information Technology (IT) Portal Vendor Software|
Portal for finding University of Illinois campus wide technology resources & training