Controlling access to the CLC Server, data and execution environments

This section describes recommended practices for configuring a CLC Genomics Server environment with strictly controlled access to server functionality, to data stored in CLC Server File System Locations and to files stored in external areas available via the CLC Server, and to execution environments external to the CLC Server. These recommendations refer to settings configured on a single server installation or on the master node in a multi-node setup.

The information and recommendations below assume that the actions listed in the Quick installation guide have already been carried out, and assume that the CLC Server is configured to use LDAP or Active Directory for authentication.

It is recommended that after authentication has been configured, all further configuration steps are carried out while the CLC Server is in Maintenance Mode so that non-administrative users cannot log in during this period.

CLC Server access

Access to the CLC Genomics Server should be explicitly configured. This is done using settings under the Global permissions tab of the web client:

CLC data access

By default, any user with access to the CLC Server can access data stored in any CLC Server File System Location.

To limit access, the following two steps must be taken for each CLC Server File System Location:

  1.  Enable permissions on the File System Location.
  2.  Specify access to areas in Locations where group level permissions have been enabled.

Note: While default data deletion rules are more stringent for a CLC Server File System Location named CLC_References, it is still recommended that group permissions be explicitly set on this Location, if it exists.

CLC data deletion

Deleting data from CLC Server File System Locations involves two steps:

  1. Moving data to a recycle bin. Data is not removed from the system taking this action. Data in recycle bins can be restored.
  2. Emptying the recycle bin. This action deletes the data from the disk. By default, all users can empty their own recycle bins. On controlled setups, this action should be be restricted to just administrators.

Client software differences relating to recycle bins:

External data access

The CLC Server can be configured to allow access to data areas external to it and to its File System Locations. By default, all users can access files located in such external areas. Access restrictions should be explicitly configured.

External data areas that may be configured for a given CLC Server are:

Direct data transfer

For controlled environments, it is expected that data should only be imported from external locations known to the CLC Server (e.g. import/export directories).

By default, direct data transfer is not enabled. Keeping this default setting is recommended. When direct data transfer is not enabled, files and data local to the system running a CLC Workbench or the CLC Server Command Line Tools cannot be transferred directly to the CLC Server.

Important notes:

Access to external analysis infrastructure

By default, all users with access to the CLC Server using a CLC Workbench or the CLC Server Command Line Tools can launch analyses to run on external systems supported by the CLC Server. Access can be more finely controlled, if desired. Specifically:

Encrypted communication

Encrypted communication between the CLC Server and client software should be used.

Certificates should be added, and settings updated as needed. Refer to the SSL and encryption section of the manual for details. Encryption of traffice between the master server and execution nodes is also described in that section.

Note: The encrypted communication between clients and the server supported out of the box uses a self-signed certificate, and by default, unencrypted connections will still be accepted.