Visit Request
International Access
Department of Commerce export control regulations permit HPCMP Kerberos client software kits and hardware authentication tokens, YubiKeys, to be used outside of the United States. Hardware tokens must be provided to users while they are in the United States, and Kerberos kits must be downloaded by users while they are in the United States. Below are four use cases that impact the use of HPCMP Kerberos kits and hardware tokens:
- S. citizens in the United States.
- Non-U.S. citizens in the United States.
- S. citizens abroad.
- Non-U.S. citizens abroad.
For the first two use cases (use in the United States), there are no restrictions on the use of Kerberos kits or hardware tokens to access HPCMP systems. For the second two use cases (use outside the United States), both Kerberos kits and hardware tokens can be exported (taken abroad) and re-exported (returned to the United States) under a Department of Commerce license exception (License Exception for baggage described in Part 740.14(f)(1) and 740.14(f)(2) of the Export Administration Regulations (EAR)). This exception can be used by all users to export and re-export hardware tokens and Kerberos kits, except for citizens of embargoed countries (Cuba, Iran, North Korea, Sudan, and Syria), and except for exports or re-exports to and from those countries by anyone.
Policy for accessing HPCMP resources while traveling outside the United States
Users may access HPCMP resources while traveling outside the United States only with prior HPCMP approval. The process for acquiring this approval is done through the Portal to the Information Environment (pIE). Under the “User Information Environment” in pIE, the user should select “Submit an International Access Authorization Request” and follow the instructions. pIE will pre-populate the user information and resource information (systems where the user already has an active account). The user must complete the dates of travel, destination, and phone number of the location where computer access will occur. The request must be approved by the user’s S/AAA and the HPCMP security officer at least five (5) business days prior to the date when access from outside US and Canada will commence. Users who attempt to access the HPCMP resources from outside the United States without prior approval will be deactivated immediately and may be denied access to the HPCMP resources when they return to the United States.
Non-US citizens living outside the United States may access HPCMP resources with the approval of their government sponsor, for a limited time (less than one year). These requests must follow the same procedures as outlined in the paragraph above.
* Citizens of embargoed countries may not run on HPCMP resources.
Visit Request Procedures for Accessing HPCMP Resources
DISS Account: W03GAA
Visit Dates: [Current Date] - [not to exceed 1 year]
Reason For Visit: Other
POC: Security Specialist
POC Phone: 601-634-4291
Alternate Option:
FAX: The Visit Request must be faxed from user's FSO or SM to the Primary SM at the ERDC Security Office:
Phone: 601-634-4291
FAX: 601-619-5173 (Call 601-634-3177 before faxing)
Email:
Processing International Visit Requests
Visit Requests should no longer be sent "Embassy to Embassy." The foreign national's agency should now send the visit request via email or fax directly to Judy Yost (ERDC Security) with basically the same information that would have been sent to the embassy. The user's government POC will be contacted by Judy Yost prior to granting the access to confirm that the access request is legitimate. An official government to government agreement must be in place prior to Judy processing the visit request. Regardless of the clearance/investigation level that is submitted by the foreign national's agency, the foreign national's information in pIE will be annotated in pIE as merely having a NACI and this user will only be allowed access to unclassified HPC resources.
HPC Training - https://centers.hpc.mil/users/HPCTraining.html
Below is a list of HPCMP User Resources. If you’re in need of a quick refresher on how to use HPCMP resources, visit https://centers.hpc.mil/users/index.html#accounts.
Still can’t find what you’re looking for? Feel free to email us HPCMP [at] hpc.mil.
Guidance and Policies
- Take the DoD Information Assurance (Cyber Awareness Challenge)
- Send a Visit Request to Engineer Research and Development Center (ERDC)
- Section IV Government Endorsement Form for non-US Citizens [PDF enabled version]
- International Access policy
Resources, User Portals and Links for Users
-
-
- Advance Reservation Service (ARS)
- Baseline Configuration
- Computational Research and Engineering Acquisition Tools and Environments (CREATE) Community Site (DoD PKI Required)
- HPC Help Desk ticket system (HPCMP OpenID Required)
- User Dashboard (HPCMP OpenID Required)
- Data Analysis and Assessment Center (DAAC)
- Defense Research and Engineering Network (DREN) Map (updated 10/29/2019 - pdf) (DoD PKI Required)
- DREN Portal (DoD PKI Required)
- HPC Centers
- HPC Portal
- Kerberos & Authentication
- Portal to the Information Environment (pIE) (HPCMP OpenID Required)
- Uniform Use-Access Policy for Unclassified DoD HPCMP Resources (DoD PKI Required)
- Service/Agency Approval Authority (S/AAA) Information (DoD PKI Required)
- Security Users (DoD PKI Required)
- Training
- User Advocacy Group (UAG) Information (HPCMP OpenID Required)
- SDN Knowledge Base
-
User Interface Toolkit (UIT)
Whether New to HPCMP Resources or in need of a quick refresher, this page will help guide you.
New Users (link to the HPC Centers page https://centers.hpc.mil/users/index.html#accounts)
The Department of Defense High Performance Computing Modernization Program (HPCMP) has a rich history of providing computational resources to the DoD Research and Development, Test, and Evaluation (RDT&E) and Acquisition Engineering (AE) communities. HPCMP users consistently demonstrate significant scientific and engineering achievements that address critical mission needs. The Program plays an important role in helping the Department strengthen its scientific footprint by engaging with the next generation of STEM talent and current DoD mentors.
The HPCMP provides annual, summer research opportunities to students and faculty through the HPC Internship Program (HIP) and Faculty Immersion Experience. The HIP offers current students and recent graduates majoring in a STEM discipline, research opportunities to gain exposure to and experience with high-end computing (HEC). The Faculty Immersion Experience provides significant opportunities for faculty members to strengthen DoD and academic collaboration, enhances research capabilities, and encourages broader university-level participation in HEC. Participants of both programs are paired with DoD mentors for a 10-week on-site research experience.
More information can be found at the HPCMP Workforce Development Website
Under the authority of the DoD HPCMP and DREN Authorizing Official (AO), HPCMP Security maintains multi-tiered cybersecurity risk management processes to reduce risk and maximize resiliency of HPCMP networks and systems. In doing so, the CSPM continuously monitors and evaluates the effectiveness of management and technical controls to enable risk management framework (RMF) assessments and authorizations, identification and remediation of vulnerabilities, and communication of risks to the HPCMP AO.
Additionally, the CSPM publishes and enforces cybersecurity guidance applicable to the unique computational and networking environments throughout the HCPMP. In coordination with the DoD and Service-level risk advisory groups, the CSPM continuously evolves risk management practices through the use of authoritative cybersecurity data and operationally-relevant threat sources. In managing and monitoring cyber risks, the CSPM reinforces the Program's commitment to deliver a resilient cyber terrain enabling RDT&E and AE users' pursuit of innovative solutions to the Department's most critical mission challenges.
For information regarding HPCMP's CSPM functions, please contact