General Articles
Articles for general topics
- Get an acrux account
- How to access the gitlab server
- Spang Lab Services
- SSH Keys
Student Articles
Articles for students at the Spang Lab
Employee Articles
Use these articles if you work at the Spang Lab.
PhD Articles
Articles for PhD Students at the Spang Lab
Sysadmin Articles
Articles that document Spang Lab Infrastructure
Get an acrux account
Michael Huttner4.8.2023, 14:56:52Register
To get access to most of our services you will need an account.
Your University account will not work, you will need to register seperately.
Wait for confirmation
You account need to be confirmed by an admin before you can use it.
The admins are:
Contact one of them after you registered.
(If you registered for a jupyter course, your account will be unlocked before the course starts automatically)
Use your account
For many services you will need explicit permission, which means an admin must assign a special group in the acrux admin interface.
These group will allow you to use the service or access advanced features.
| Service | Url | Groups |
|---|---|---|
| Acrux | https://auth.spang-lab.de | admin, unconfirmed, readonly, secure |
| Jupyter Hub | https://jupyter.spang-lab.de | jupyter |
| Patho Viewer | https://patho.spang-lab.de | patho |
| Compute Servers | Read More... | rhskl |
| Datatomb | Read More... | datatomb, datatombadmin |
| Lyra | https://lymmml.spang-lab.de | lyra |
| Kubernetes | Read More... | kubernetes |
| Metadata Collector | https://metadata.spang-lab.de | metadata, metadatauser |
Profile
You can manage your profile after signing in at https://auth.spang-lab.de
SSH Key
You can generate a ssh-keypair and add it to the auth server in your Profile.
ssh-keygen -a 100 -t ed25519 -f ~/.ssh/id_ec_spang_lab
Copy your ssh public key:
cat ~/.ssh/id_ec_spang_lab.pub
and copy it to the "SSH Key" Field
Two factor authentication
If you have a device that supports FIDO2 or WebAuthn such as a Yubikey or a Solo Key you can register the device as a second factor in your profile.