IDA user instructions

The IDA service will be renewed during summer 2018. Projects and users will be migrated from the old IDA to the renewed service. These user instructions apply for the current IDA service and its user interfaces. We don't recommend creating new metadata in the old IDA service, since managing metadata will be done differently in the new services supporting digital preservation launched mid-2018. More information about the IDA service renewal.

The renewed IDA will enable access via new web browser UI and command line. The current icommands (iRODS), Cyberduck file transfer program and SUI My Files will not be supported after the transition to the renewed service.

The remainder of this web page applies to the old version of IDA which will be soon replaced, for those who still need to use the old service.


User accounts
Different user interfaces
IDA browser user interface
IDA command line tools
IDA Cyberduck usage
Describing and sharing data
Service availability and maintenance breaks

User accounts
The service may be used based on applications for storage space and user accounts, more information is available on

When access rights to IDA are granted the user gets a CSC user name, CSC password and an IDA password. If the user already had a CSC user name then no new CSC user name or CSC passwords are created. The same CSC user name is used in all services but the password is service specific.

The IDA password can currently be changed only in the command line interface. In case you forget your password, please contact the IDA administration at ida at

Different user interfaces

IDA can be used with different user interfaces: browser, command line and file transfer program.

With browser user interface you can use all basic features including uploading, updating, removing and downloading files and directories, and their metadata. The browser user interface is accessed through CSC's customer portal Scientist's User Interface (SUI), where IDA storage space is also applied for and managed. Command line has most versatile functions for managing data, metadata and user rights. Command line use is also best suited for large file uploads. The data stored in IDA is available at CSC's computatitonal servers through command line. The tool can also be used to integrate the service to customer's own systems for command line use. Cyberduck file transfer program offers diverse functions and enables uploading multiple files at once with a graphical user interface. The table below presents the features of IDA user interfaces.

  Browser use File transfer program (Cyberduck) Command line (icommands)
File transfer capabilities single file at a time multiple files or folders multiple files or folders, scripts available
Recommended maximum file size less than 10 GB even tens of GBs even few hundred GBs
User can view and edit metadata yes no yes
Use requires installation no yes, available for Mac and Windows yes for own devices, also available via Taito
Graphical user interface yes yes no
User can view checksums and file copies no no yes, checksum also recalculable


Browser user interface
IDA browser user interface is part of the Scientist's User Interface. Log in to SUI: Gateway to your files:

You can log in by using the CSC account and CSC password or by authentication by Haka. The IDA password is not needed in the browser user interface. In order to log in with Haka in the Scientist's User Interface, you need to link your CSC user name to your Haka account (

More information about browser user interface

IDA command line tools
For using IDA via command line, a binary installation package is available for Linux environments. IDA can be integrated to the computing environment by means of so called i commands. Command line authentication uses the IDA password.

More information about command line

IDA Cyberduck usage
If using IDA through SUI seems too limited or the command line commands aren't an option for you, you can use the Cyberduck program on Windows and Mac OS:X to manage your IDA folders and files through a graphical interface.

More information about Cyberduck

Describing and sharing data
Files stored in IDA can be managed through metadata. IDA fulfills the requirements set by the minimum metadata model and completes the metadata automatically. The metadata can be modified in the Scientist's User Interface or by using command line.

Files stored in IDA may be shared openly or via an application by describing the data in Etsin data finder and by making the file downloable by editing its metadata in IDA. This creates a permanent entry for your data in the Etsin data finder, making the data discoverable for others. Additional information about sharing files are given in the browser user interface instructions.

A list of metadata fields provided in the IDA files and directories:

Name Type IDA prefills
 Metadata.identifier PID (URN) X
Metadata.modified ISO 8601 (vvv-kk-ppTtt:mm:ssZ) X
Identifier.version PID (URN) X
Identifier.series PID (URN) X
Modified ISO 8601 (vv-kk-ppTtt:mm:ssZ) X
Contact.type "Project" / "Organization"/ "Person" text RFC 822 ( tel URI (tel. +mmmssnnnnnnn) text  
Project.funder Y-tunnus (nnnnnnn-t)  
Project.funder_grant_number  Funding ID  
Title text  
Title.lang ISO 639-3 (fin/sve/eng/...)  
Rights.category "COPYRIGHTED" /                            "CONTRACTUAL" / "LICENSED" /  "PUBLIC DOMAIN" / "OTHER"  
Rights.declaration URI (linkki lisenssitekstiin)  

text / URI (ex.

Creator ORCID / ISNI (ex.  
Owner Y-tunnus / ISNI  
Language ISO 639-3 (fin/sve/eng/...)  


The IDA service users are authenticated by a user name and password or by the Haka identity federation. The username and password are for personal use only and must not be shared with anyone else.

The connection between the user's browser and IDA service is SSL encrypted. Service SSL certificate is issued by TERENA ( The network folder connection is also SSL encrypted. Data transfer with command line commands (command line/icommands and Cyberduck/iRODS) is not encrypted in the IDA iRODS system which is why the users are advised to encrypt their own files.

All files stored into the service are scanned for viruses and quarantined if a virus is found.

If the user notices someone trying to snoop their user login details or receives an email about a virus despite the scan, they are required to contact IDA administration (ida at immediately. The same address may be used to report any issue regarding the security of the service.

Possible usage infringements may lead to procedures locking the user account. Service usage is logged in IDA in order to monitor security and ensure service sustainability. Log information is also needed to e.g. offer assistance in file recovery.

Service availability and maintenance breaks
Every third Monday of the month at 13.00-15.00 is reserved for a service maintenance break. The service is not available during the break. Users are informed by email of service breaks. Technical or security anomalies may cause unscheduled service breaks for which announcements may not be sent prior to the break.