Identity and authentication¶
This page describes how user identities are managed and how authentication works for accessing platform services.
Identity management is designed to ensure security, traceability, and alignment with GDPR and ISO/IEC 27001 information security practices.
Institutional identity¶
Access to the platform is based on institutional digital identities.
- Internal users authenticate using their University of Bologna account
- Each user is associated with a unique, personal identity
- Shared or generic accounts are not permitted
This approach ensures accountability and traceability of user activities.
Project-based authorization¶
Authentication confirms who you are.
Authorization defines what you are allowed to access.
Access rights are granted:
- Per project
- Per service (HPC, S3 storage)
- For a limited duration
Users can only access the resources explicitly approved for their project.
Authentication methods¶
Depending on the service, authentication may involve one or more of the following:
- Institutional Single Sign-On (SSO) for VPN access
- Username and password authentication
- SSH key-based authentication
- Access keys (for S3 storage)
- Multi-Factor Authentication (MFA), where required
The exact authentication method depends on the service and the classification of the data involved.
HPC access¶
Access to the HPC cluster requires connection to the University network.
- Users must authenticate using their institutional account to access the VPN of the Cesena Campus
- Once connected to the VPN, access to the HPC cluster is provided using a personal account assigned by the platform administrators
- Authentication can be performed using:
- Username and password
- SSH key-based authentication (recommended)
Passwords must be changed periodically and at least every three months.
S3 storage access¶
Access to the S3 storage service is based on access credentials:
- Access key
- Secret key
These credentials:
- Are assigned to individual users or projects
- Must be kept confidential
- Must be rotated periodically (at least every three months)
Access to the S3 service from outside the University network may be restricted to authorized IP addresses.
Credential handling rules¶
Users are responsible for protecting their credentials.
Users must:
- Keep passwords, private keys, and access keys confidential
- Use strong passphrases
- Avoid storing credentials in plain text
- Never commit credentials to code repositories
- Never share access with other users
Failure to comply with these requirements may result in suspension or revocation of access.
External collaborators¶
External collaborators may be granted access if:
- They are formally involved in an approved research project
- Appropriate legal agreements are in place (e.g. DTA, DPA)
- An institutional or federated identity is available
Access for external collaborators is typically limited to the duration and scope of the project.
Account lifecycle¶
User accounts follow a defined lifecycle:
- Account creation following formal approval
- Periodic review of active accounts
- Suspension or removal at project end or upon termination of affiliation
Accounts that are no longer required are disabled to reduce security risks.
Logging and traceability¶
Relevant authentication and access events are logged and monitored for security and compliance purposes.
Logs are used to:
- Detect security incidents
- Support audits
- Investigate misuse or policy violations
Log data is handled in accordance with institutional policies and data protection requirements.
What to do in case of issues¶
If you suspect that your credentials have been compromised:
- Stop using the affected credentials immediately
- Contact platform support as soon as possible
- Follow the instructions provided by administrators
Prompt reporting helps limit potential security impacts.
Next steps¶
- Review First login for connecting to the HPC cluster
- Read Security principles for researchers