Check out a special edition of our newsletter dedicated to account security and further details about this new policy

This virtual workshop discusses these two policies in detail and demonstrates how to enable two factor auth, upload SSH keys to your CCR account, and login with both.

As of July 27, 2021 CCR will be modifying its account security policies to enhance the security of CCR accounts.  There are two changes users need to be aware of and may need to take action on prior to this update:

Two factor authentication will be REQUIRED on all accounts
This policy change aligns CCR account security with UBIT account policies which have required two factor authentication (2FA) for most services over a year.  This is one of the requirements many federal agencies are putting on institutions that accept grant dollars so it is no longer optional at CCR.  See this article for instructions on enabling two factor authentication on your CCR account.

We recommend this short video demonstrating how to enable and then login with 2FA.  Guaranteed to save you time and hassle!

Don't have a smartphone?  Here are some alternatives for one-time token generation

Logging in to CCR accounts with 2FA

SSH/SFTP/SCP will no longer accept passwords

For those who use SSH/SFTP/SCP to login or transfer files to CCR servers, we will now require SSH keys and no longer accept passwords for the SSH service.  See this article for instructions on uploading your SSH key to the CCR identity management portal.  If you do not use SSH to login to CCR servers (i.e. vortex1, vortex2, transfer), you do not need to do this. 

How to login to CCR using SSH keys on Linux/MacOS

How to login to CCR using SSH keys on Windows

NOTE:  SSH will NOT prompt for a second factor so you will not need to generate a one-time token.

GUI-based file transfer applications will need to be configured to allow the use of your private SSH key.  Some software products require a different format for these keys.  We can not provide documentation for each piece of software; however, most are very similar to FileZilla or the software vendor may provide documentation for SSH-based authentication on their website.