IDA user instructions

User accounts
Different user interfaces
IDA browser user interface
IDA command line tools
IDA Cyberduck usage
Describing and sharing data
Service availability and maintenance breaks


User accounts
The service may be used based on applications for storage space and user accounts, more information is available on

When access rights to IDA are granted the user gets a CSC user name, CSC password and an IDA password. If the user already had a CSC user name then no new CSC user name or CSC passwords are created. The same CSC user name is used in all services but the password is service specific.

The IDA password can currently be changed only in the command line interface. In case you forget your password, please contact the IDA administration at ida at


Different user interfaces

IDA can be used with different user interfaces: browser, command line and file transfer program.

With browser user interface you can use all basic features including uploading, updating, removing and downloading files and directories, and their metadata. The browser user interface is accessed through CSC's customer portal Scientist's User Interface (SUI), where IDA storage space is also applied for and managed. Command line use is best suited for large file uploads. The data stored in IDA is available at CSC's computatitonal servers through command line. The tool can also be used to integrate the service to customer's own systems for command line use. Cyberduck file transfer program offers diverse functions and enables uploading multiple files at once with a graphical user interface.


Browser user interface
IDA browser user interface is part of the Scientist's User Interface. Log in to SUI: Gateway to your files:

You can log in by using the CSC account and CSC password or by authentication by Haka. The IDA password is not needed in the browser user interface. In order to log in with Haka in the Scientist's User Interface, you need to link your CSC user name to your Haka account (

More information about browser user interface


IDA command line tools
For using IDA via command line, a binary installation package is available for Linux environments. IDA can be integrated to the computing environment by means of so called i commands. Command line authentication uses the IDA password.

More information about command line


IDA Cyberduck usage
If using IDA through SUI seems too limited or the command line commands aren't an option for you, you can use the Cyberduck program on Windows and Mac OS:X to manage your IDA folders and files through a graphical interface.

More information about Cyberduck


Describing and sharing data
Files stored in IDA can be managed through metadata. IDA fulfills the requirements set by the minimum metadata model and completes the metadata automatically (e.g. persistent URN identifiers for the files). The metadata can be modified in the Scientist's User Interface or by using command line.

Files stored in IDA may be shared by indicating so in the metadata. This functionality is currently being developed further. Right now, you can choose between making your file openly and publicly downloadable via AVAA or describing your data in Etsin which creates a permanent entry for your data in the Etsin data finder, making the data discoverable for others and enabling sharing the data based on accepting requests to the data.

Additional information about sharing files are given in the browser user interface instructions

A list of metadata fields provided in the IDA files and directories:

 Name  Type  IDA prefills
 Metadata.identifier  PID (URN)  X
 Metadata.modified  ISO 8601 (vvv-kk-ppTtt:mm:ssZ)  X
 Identifier.version  PID (URN)  X
 Identifier.series  PID (URN)  X
 Modified  ISO 8601 (vv-kk-ppTtt:mm:ssZ)  X
 Contact.type  "Project" / "Organization"/ "Person"  text  RFC 822 (  tel URI (tel. +mmmssnnnnnnn)  text  
 Project.funder  Y-tunnus (nnnnnnn-t)  
 Project.funder_grant_number   Funding ID  
 Title  text  
 Title.lang  ISO 639-3 (fin/sve/eng/...)  
 Rights.category "COPYRIGHTED" /                            "CONTRACTUAL" / "LICENSED" /  "PUBLIC DOMAIN" / "OTHER"  
 Rights.declaration  URI (linkki lisenssitekstiin)  

 text / URI (ex.

 Creator  ORCID / ISNI (ex.  
 Owner  Y-tunnus / ISNI  
 Language  ISO 639-3 (fin/sve/eng/...)  


The IDA service users are authenticated by a user name and password or by the Haka identity federation. The username and password are for personal use only and must not be shared with anyone else.

The connection between the user's browser and IDA service is SSL encrypted. Service SSL certificate is issued by TERENA ( The network folder connection is also SSL encrypted. Data transfer with command line commands (command line/icommands and Cyberduck/iRODS) is not encrypted in the IDA iRODS system which is why the users are advised to encrypt their own files.

All files stored into the service are scanned for viruses and quarantined if a virus is found.

If the user notices someone trying to snoop their user login details or receives an email about a virus despite the scan, they are required to contact IDA administration (ida at immediately. The same address may be used to report any issue regarding the security of the service.

Possible usage infringements may lead to procedures locking the user account. Service usage is logged in IDA in order to monitor security and ensure service sustainability. Log information is also needed to e.g. offer assistance in file recovery.


Service availability and maintenance breaks
Every third Monday of the month at 13.00-15.00 is reserved for a service maintenance break. The service is not available during the break. Users are informed by email of service breaks. Technical or security anomalies may cause unscheduled service breaks for which announcements may not be sent prior to the break.