IDA user instructions
The IDA service will be renewed during summer 2018. Projects and users will be migrated from the old IDA to the renewed service. These user instructions apply for the current IDA service and its user interfaces. We don't recommend creating new metadata in the old IDA service, since managing metadata will be done differently in the new services supporting digital preservation launched mid-2018. More information about the IDA service renewal.
The renewed IDA will enable access via new web browser UI and command line. The current icommands (iRODS), Cyberduck file transfer program and SUI My Files will not be supported after the transition to the renewed service.
The remainder of this web page applies to the old version of IDA which will be soon replaced, for those who still need to use the old service.
When access rights to IDA are granted the user gets a CSC user name, CSC password and an IDA password. If the user already had a CSC user name then no new CSC user name or CSC passwords are created. The same CSC user name is used in all services but the password is service specific.
The IDA password can currently be changed only in the command line interface. In case you forget your password, please contact the IDA administration at ida at csc.fi
IDA can be used with different user interfaces: browser, command line and file transfer program.
With browser user interface you can use all basic features including uploading, updating, removing and downloading files and directories, and their metadata. The browser user interface is accessed through CSC's customer portal Scientist's User Interface (SUI), where IDA storage space is also applied for and managed. Command line has most versatile functions for managing data, metadata and user rights. Command line use is also best suited for large file uploads. The data stored in IDA is available at CSC's computatitonal servers through command line. The tool can also be used to integrate the service to customer's own systems for command line use. Cyberduck file transfer program offers diverse functions and enables uploading multiple files at once with a graphical user interface. The table below presents the features of IDA user interfaces.
|Browser use||File transfer program (Cyberduck)||Command line (icommands)|
|File transfer capabilities||single file at a time||multiple files or folders||multiple files or folders, scripts available|
|Recommended maximum file size||less than 10 GB||even tens of GBs||even few hundred GBs|
|User can view and edit metadata||yes||no||yes|
|Use requires installation||no||yes, available for Mac and Windows||yes for own devices, also available via Taito|
|Graphical user interface||yes||yes||no|
|User can view checksums and file copies||no||no||yes, checksum also recalculable|
You can log in by using the CSC account and CSC password or by authentication by Haka. The IDA password is not needed in the browser user interface. In order to log in with Haka in the Scientist's User Interface, you need to link your CSC user name to your Haka account (https://sui.csc.fi/web/sui/add-services).
More information about browser user interface
IDA command line tools
For using IDA via command line, a binary installation package is available for Linux environments. IDA can be integrated to the computing environment by means of so called i commands. Command line authentication uses the IDA password.
More information about command line
IDA Cyberduck usage
If using IDA through SUI seems too limited or the command line commands aren't an option for you, you can use the Cyberduck program on Windows and Mac OS:X to manage your IDA folders and files through a graphical interface.
More information about Cyberduck
Describing and sharing data
Files stored in IDA can be managed through metadata. IDA fulfills the requirements set by the minimum metadata model and completes the metadata automatically. The metadata can be modified in the Scientist's User Interface or by using command line.
Files stored in IDA may be shared openly or via an application by describing the data in Etsin data finder and by making the file downloable by editing its metadata in IDA. This creates a permanent entry for your data in the Etsin data finder, making the data discoverable for others. Additional information about sharing files are given in the browser user interface instructions.
A list of metadata fields provided in the IDA files and directories:
|Metadata.modified||ISO 8601 (vvv-kk-ppTtt:mm:ssZ)||X|
|Modified||ISO 8601 (vv-kk-ppTtt:mm:ssZ)||X|
|Contact.type||"Project" / "Organization"/ "Person"|
|Contact.email||RFC 822 (email@example.com)|
|Contact.phone||tel URI (tel. +mmmssnnnnnnn)|
|Title.lang||ISO 639-3 (fin/sve/eng/...)|
|Rights.category||"COPYRIGHTED" / "CONTRACTUAL" / "LICENSED" / "PUBLIC DOMAIN" / "OTHER"|
|Rights.declaration||URI (linkki lisenssitekstiin)|
text / URI (ex.
|Creator||ORCID / ISNI (ex. http://orcid.org/0000-0003-0296-7410)|
|Owner||Y-tunnus / ISNI|
|Language||ISO 639-3 (fin/sve/eng/...)|
The IDA service users are authenticated by a user name and password or by the Haka identity federation. The username and password are for personal use only and must not be shared with anyone else.
The connection between the user's browser and IDA service is SSL encrypted. Service SSL certificate is issued by TERENA (www.terena.org). The network folder connection is also SSL encrypted. Data transfer with command line commands (command line/icommands and Cyberduck/iRODS) is not encrypted in the IDA iRODS system which is why the users are advised to encrypt their own files.
All files stored into the service are scanned for viruses and quarantined if a virus is found.
If the user notices someone trying to snoop their user login details or receives an email about a virus despite the scan, they are required to contact IDA administration (ida at csc.fi) immediately. The same address may be used to report any issue regarding the security of the service.
Possible usage infringements may lead to procedures locking the user account. Service usage is logged in IDA in order to monitor security and ensure service sustainability. Log information is also needed to e.g. offer assistance in file recovery.
Service availability and maintenance breaks
Every third Monday of the month at 13.00-15.00 is reserved for a service maintenance break. The service is not available during the break. Users are informed by email of service breaks. Technical or security anomalies may cause unscheduled service breaks for which announcements may not be sent prior to the break.