
●
#
urika-service-mode
●
#
urika-state
7.2.2
User Interface Access in the Secure Service Mode
The Urika-GX system returns a number of error messages when users attempt to access application UIs in the
secure mode.
Direct access to a UI
Each service is designated a specific port number that it runs on, while the system is operating in the default
service mode. For example, Jupyter Notebook's UI runs at
http://
hostname
-login1:7800
in the default
mode. Only services supported under secure mode will be accessible via their direct URLs under secure mode.
Therefore, if it is attempted to access UIs running on the login node using a direct URL that includes the service's
designated port number, the system will return an error stating that the server could not be contacted. The exact
error message will depend on how the user attempts to access the service.
Accessing the Root URL
The root URL of the Urika-GX server is
http://
hostname
-login1
. If the user attempts to access this URL
while the system is in the secure service mode, the system will return the following message:
Requested service unavailable under current security mode
Accessing an Application URL
If the user attempts to access an application specific URL, the behaviour will be different for individual services.
For example, the system will return the following error if it is attempted to access
http://
hostname
-login1/
marathon
in the secure mode:
Not Found
The requested URL /marathon was not found on this server.
UIs on the SMW
UIs running on the SMW can be accessed under both the default and secure service modes. For example, the
Nagios UI can be accessed in both modes.
7.3
Security Architecture Overview
The Urika-GX security architecture has two key goals:
●
Authentication and authorization - Making sure that no part of the system allows user impersonation. For
more information, refer to
Authentication and Authorization
on page 175
●
Tenancy - Providing a means to prevent unauthorized access to sensitive shared resources. For more
information, refer to
on page 183
As part of the security architecture, two additional concepts work together to tailor the security level to the needs
of the site and users. These include:
Security
S3016
181