Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

These are the instructions on how to install and configure your Teleport SSH access on Windows 10 and 11 using MobaXterm to connect to ECMWF services such as the Atos HPCF and ECGATE services.

Info

Check

...

the following pages if you are using

...

another Windows method:

Teleport SSH Access - Windows Terminal and Powershell configuration

Teleport SSH Access - Windows Subsystem for Linux (WSL)

Teleport SSH Access - Windows Cygwin configuration

Table of contents

Table of Contents
excludeTable of contents

Demo

Here is a demonstration on how to set up Teleport to connect to our our Atos HPCF from your terminal on a Windows 10 or 11. You can find the step by step guide described below.

...

We strongly recommend setting up all the SSH options needed for the connection instead of passing them on the command line.

Excerpt
  • Open the File Explorer and navigate to C:\Users\yourwindowsuser\
  • If you have a directory called  ".ssh" directory, go inside. If not, you may create it with clicking on "New Folder"
  • Inside the .ssh directory, check if there is a file called "config".
    1. If config exist, open it with your favourite editor, such as notepad or vscode.
    2. If config does not exist, you can open your favourite editor such as notepad or vscode to create the file and save it later
  • Add the snipped below in the file you opened

    Edit the file ~/.ssh/config in your MobaXterm local terminal and add the snippet below. You may create it if it does not exist. You should replace ecmwfusername by your registered ECMWF user and user.address@somewhere.com by your registered email address at ECMWF.

    Code Block
    languagetext
    titleSSH config snippet in ~/.ssh/config
    Host jump.ecmwf.int a?-* a??-* hpc-* hpc2020-* ecs-*
      User ecmwfusername 
      IdentityFile ~/.tsh/keys/jump.ecmwf.int/user.address@somewhere.com
      CertificateFile ~/.tsh/keys/jump.ecmwf.int/user.address@somewhere.com-ssh/jump.ecmwf.int-cert.pub
      HostKeyAlgorithms +ssh-rsa*,rsa-sha2-512
      PubkeyAcceptedKeyTypes +ssh-rsa*
      ServerAliveInterval 60
      TCPKeepAlive yes
    
    Host a?-* a??-* hpc-* hpc2020-* ecs-*
      ProxyJump jump.ecmwf.int
    You should replace ecmwfusername by your registered ECMWF user and user.address@somewhere.com by your registered email address at ECMWF.


    Tip
    titleNot sure about username and email?

    You can find the right values for those two parameters in the output of the tsh command:

    Panel

    % tsh login
    > Profile URL: https://jump.ecmwf.int:443
    Logged in as: user.address@somewhere.com
    Cluster: jump.ecmwf.int
    Roles:
    Logins: ecmwfusername
    Kubernetes: disabled
    Valid until: 2022-12-13 20:54:18 +0000 GMT [valid for 3h56m0s]
    Extensions: permit-X11-forwarding, permit-agent-forwarding, permit-port-forwarding, permit-pty  

  • Save the file. If you are creating the file from scratch, make sure you save it under C:\Users\yourwindowsuser\.ssh and with the name "config", including the double quotes.
  • Make


    Now you should make the tsh internal directory where SSH certificates are generated visible within MobaXterm running the following command on a MobaXterm local terminal:

    No Format
    ln -s /drives/c/Users/yourwindowsuser/.tsh ~/


    SSH connection

    Once you have configured the appropriate settings, any SSH-based tools such as ssh, scp or rsync should work out of the box without any additional options.

    ...