Getting started

Before you connect to the ICR for the first time, you will need the following:

  • ICR username
  • ICR password

In most cases, a VPN connection is not required. If your institution, organization, or home network has a public static IP, domain name (DNS), or an identifiable network range, please share it with us. We can authorize direct access from that network, so you will not need a VPN user or password.

If you do not have a fixed IP or network that can be authorized, you will also need:

  • VPN username
  • VPN password

Make sure you have all the required information before getting started. If you’re missing anything, feel free to contact us at .

VPN setup (optional)

  1. The VPN connection is established using the FortiClient VPN client. You can download the free version here.
  2. Use the following configuration:
    1. Connection name: LB_VPN
    2. Host: https://vpn.lightbridges.es
    3. Port: 10443
    4. Other options, such as SSO or user certificate, should be disabled.
  3. Select the connection named LB_VPN and click Connect. Enter your VPN username and VPN password when prompted.
  4. If your network has been authorized by IP or DNS, you can skip this step and go directly to the SSH connection section.

SSH connection

  1. Open a terminal client that is compatible with SSH.
  2. Run a SSH connection with the provided ICR username and password: ssh -p 3336 [username]@icr.lightbridges.es
  3. Introduce your password.

If you have connection problems, try replacing the domain name icr.lightbridges.es by the ICR internal IP code 10.0.203.2, i.e.
ssh -p 3336 [username]@10.0.203.2

Creating a user

Your default user for accessing the ICR via SSH is root.

We strongly recommend that the first step be to create a new user (using the adduser [newuser] command) inside your ICR without super admin rights.

Obviously, you might also want to create other users for other collaborators that may need access to the ICR. The ICR is physically yours, so it is not a service, and you’re free to create users, define roles and manage their permissions, etc.

For security reasons, we recommend using a strong password or SSH key authentication for each user. You can generate secure random passwords using one of the following commands:

openssl rand -base64 24
gpg --gen-random 1 20 | base64 -w0 | tr -d '/+' | cut -c1-20
head /dev/urandom | tr -dc A-Za-z0-9_- | head -c 24 ; echo

These commands generate random alphanumeric passwords that are hard to guess. You can also configure your SSH access to use authorized_keys for passwordless and more secure authentication.

Security

Please read this information carefully

An ICR is, in practice, your own scalable supercomputer. You are fully responsible for its content, operation, and security policies. Light Bridges does not have access to its storage and cannot interfere with it, except for producing or eliminating ICR.

If you configure insecure policies on your ICR or expose sensitive data to the public, we reserve the right to shut down the ICR and/or delete its contents, preserving the hardware.