Procedure Outline

Remote access to the MOGON clusters is granted via Secure Shell (SSH) and confirmed with a second-factor of authentication.

Get an HPC Account

Please start here if you don't have an HPC account yet.

Once your JGU account is affiliated with an HPC project, you’ll receive a confirmation email with further instructions for accessing MOGON. Follow the steps below.

Onboarding Procedure

Complete the onboarding by performing two independent steps. You can do the SSH setup anytime (e.g., for multiple devices); 2FA activation requires a video call for identity verification.

Step 1: Setting up SSH

Generate an SSH key pair and upload the public key to the JGU account website to enable encrypted access to MOGON. Follow the instructions for your operating system:

Step 2: Setting up 2FA

Prepare your smartphone or tablet for two-factor authentication (2FA) by following the instructions in the Mobile Authenticator chapter.

Once ready, send an E-mail to the HPC Group from your JGU account to schedule the video call for the token activation.


MOGON Login

Once complete (after key propagation), log in to MOGON as shown here.


Onboarding Checklist
  • Request your PI to add your JGU account to an HPC project.
  • Generate your SSH keys for Linux/macOS or Windows .
  • Upload your public SSH key to your JGU account.
  • Prepare your smartphone for 2FA by installing freeOTP or privacyIDEA.
  • Email the HPC Group from your JGU account to schedule authentication.
  • Complete the 2FA configuration with an HPC admin.
  • Log in to MOGON via SSH.

Background Information

To establish a secure connection through which we can access MOGON from our local computer, the Secure Shell (SSH) protocol comes into play. The central aspect of SSH is a pair of cryptographically generated keys - a public and a private key.

As the name suggests, you can share your public key without concern - feel free to tell it to your neighbor. On the other hand, you should always keep your private key secret! While the public key can be transferred to MOGON through a potentially unsafe network, the private key will never leave its place. Even during authentication it stays on your local machine.

How do these keys help with authentication? Well, the public key can encrypt a message that only your matching private key can decrypt. So, imagine MOGON sends you a message that has been encrypted using your own public key. You can now prove your identity just by decrypting it! After all, you are the only person in the world that has the matching private key.

You can connect to MOGON without studying cryptography, though. Just follow the steps described in the MOGONdoks.

More information on SSH

An extensive account on generating SSH keys and SSH in general can be found on this external website.