Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ac secondaryuse #2238

Draft
wants to merge 22 commits into
base: master
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from 19 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/data/sensitive-data/fega-submission.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Below, you will find step-by-step instructions for uploading, describing, and pu

Submission to the Finnish Federated EGA service starts with contacting the Finnish FEGA helpdesk and providing the general information of the submission.

To begin the submission process, please fill in the [general information form](./fega-general-information.docx) with contact information, details about the data submission type and information about the data controller, or provide the same information in an email message. Send the required information via email to [CSC Service Desk](../../support/contact.md) (subject: Federated EGA). You will receive further instructions.
To begin the submission process, please fill in the [general information form](https://a3s.fi/docs-files/sensitive-data/PDF_instructions/fega-general-information.pdf) with contact information, details about the data submission type and information about the data controller, or provide the same information in an email message. Send the required information via email to [CSC Service Desk](../../support/contact.md) (subject: Federated EGA). You will receive further instructions.

!!! note

Expand Down
88 changes: 45 additions & 43 deletions docs/data/sensitive-data/findata-permit.md
Original file line number Diff line number Diff line change
@@ -1,34 +1,32 @@
# Accessing SD Desktop with a Findata permit

# How to get access to SD Desktop with a Findata permit

**[Instructions in Finnish (PDF)](https://a3s.fi/docs-files/sensitive-data/PDF_instructions/SD_toisiolaki_Findata.pdf){ target="_blank" }**

Accessing secondary use health or social data from public registries requires a permit from the **Findata** authority. You can apply for the data permit by logging in to Findata’s e-service. Instructions for applying for the data permit can be found on [Findata's website](https://findata.fi/en/permits/){ target="_blank" }.
<iframe width="280" height="155" srcdoc="https://www.youtube.com/embed/0m-fWB99shI" title="SD Desktop toisiokäyttötarkoitukseen — käsittelyluvan myöntäjänä Findata" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>

After acquiring the permit, you can start the service access process with CSC. Next, we will walk you through the steps that need to be completed in order to access the dataset on SD Desktop.
## Use case

!!! Note
* [SD Connect](sd_connect.md), a service used for storing sensitive research data, is **not accessible for registry data processing**. It is not possible to directly import any additional data, script, or software into the virtual desktop.
* If you need software that is not available on the SD Desktop by default, please contact [Service Desk](../../support/contact.md) (*Subject: Sensitive Data, Secondary use*) well in advance - even before applying for a data permit.
You need to access SD Desktop. You have a permit from Findata.

*Please note that you can create a test project and test regular SD Desktop independently, to make sure that SD Desktop is suitable for your needs. [Instructions how to access regular SD Desktop](sd-use-case-new-user-project-manager.md).*
## Solution

## Get access to SD Desktop for secondary use

1. [Create a CSC account](#1-create-a-csc-account)
1. [Create a CSC account](#1-create-a-csc-account)
2. [Create new CSC project](#2-create-new-csc-project)
3. [Fill GDPR document](#3-fill-gdpr-document)
4. [Contact CSC service desk](#4-contact-csc-service-desk)
5. CSC adds members to your project, please wait
6. CSC activates SD Desktop for your project, please wait
7. [Accept SD Desktop terms of use](#7-accept-sd-desktop-terms-of-use)
8. [Activate MFA Authentication](#8-activate-mfa-authentication)
8. [Activate MFA](#8-activate-mfa)
9. [CSC project is ready](#9-your-csc-project-is-ready)
10. [Log into SD Desktop](#10-log-into-sd-desktop)
11. [Access the data with SD Desktop](#11-access-the-data-with-sd-desktop)

### 1. Create a CSC account
**Assignment for whole team:**

!!! warning-label
Team manager
!!! info-label
Team member

- **Go to [MyCSC portal](https://my.csc.fi){ target="_blank" }**
- Log in with Haka. Select your home organization and log in to their identity service. [How to get an account without Haka](../../accounts/how-to-create-new-user-account.md#getting-an-account-without-haka-or-virtu).
Expand All @@ -37,7 +35,9 @@ After acquiring the permit, you can start the service access process with CSC. N
- You will receive your CSC user account confirmation via email.

### 2. Create new CSC project
**Assignment for team manager only:**

!!! warning-label
Team manager

- Go to ”Projects” page (left side menu or a hamburger menu at the top right corner).
- On the top of the page choose **”New project”**.
Expand All @@ -50,7 +50,9 @@ After acquiring the permit, you can start the service access process with CSC. N


### 3. Fill GDPR document
**Assignment for team manager only:**

!!! warning-label
Team manager

- Since your project handles personal data, you need to fill the GDPR document i.e. *Description of processing activity* -form.
- The document appears when you create a new project. You can edit this document later.
Expand All @@ -59,17 +61,19 @@ After acquiring the permit, you can start the service access process with CSC. N
![Personal data handling document.](https://a3s.fi/docs-files/sensitive-data/MyCSC/MyCSC_GDPR.png)

### 4. Contact CSC service desk
**Assignment for team manager only:**

!!! warning-label
Team manager

- Send email to **[email protected]**, subject: *Sensitive Data, Secondary use*.
- Write your project number to the email (e.g. *project_1234567*).
- Attach a copy of your **data permit** to the email.
- Write down a list of your research teams email addresses. Please use same emails that they created the CSC-account with.
- Write down a list of your research teams' email addresses. Please use same emails that they created the CSC-account with.
- Put your research team as cc.

!!! Note ""
### 5. CSC adds members to your project
- Please wait that Sensitive Data Support -team ads your research team to your project
- Please wait that Sensitive Data Support -team adds your research team to your project
- Note! All team members must have a [CSC-account](#1-create-a-csc-account), so they can become project members.

!!! Note ""
Expand All @@ -78,43 +82,41 @@ After acquiring the permit, you can start the service access process with CSC. N
- You will receive an email notification, when everything is ready.

### 7. Accept SD Desktop terms of use
**Assignment for whole team:**

- If you haven't accept the terms of use before, please go to MyCSC - navigate to the project view - see left side **Service** list - click SD Desktop and **accept the terms of use**.
!!! warning-label
Team manager
!!! info-label
Team member

- If you haven't accepted the terms of use before, please go to MyCSC - navigate to the project view - see left side **Service** list - click SD Desktop and **accept the terms of use**.
- Please note that every team member must accept the SD Desktop terms of use.

![How to approve terms of use.](https://a3s.fi/docs-files/sensitive-data/MyCSC/MyCSC_TermsOfUse.png)

### 8. Activate MFA Authentication
**Assignment for whole team:**
### 8. Activate MFA

- You need to activate MFA (multi-factor authentication) to be able to log in the Sensitive Data services. [More about multi-factor authentication](../../accounts/mfa.md). *If your multi-factor authentication is already enabled, you can move to step 9.*
- Before activating MFA you need to have some authentication application in your mobile, for example Google Authenticator or Microsoft Authenticator.
!!! warning-label
Team manager
!!! info-label
Team member

- You need to activate MFA (multi-factor authentication) to be able to log in to the Sensitive Data services. [More about multi-factor authentication](../../accounts/mfa.md). *If your multi-factor authentication is already enabled, you can move to step 9.*
- Before activating MFA you need to have some authentication application on your mobile phone, for example Google Authenticator or Microsoft Authenticator.
- Go to the **Profile** page (Left side menu or top right hamburger menu).
- Enable Multi-Factor Authentication by clicking **“Activate”**.
- This will create a QR code which you can read with your authentication application (for example Google Authenticator).
- You authentication application will provide a verification code which you can now write to MyCSC **“Verification code”** field and click **“Verify”**.
- Your authentication application will provide a verification code which you can now write to MyCSC **“Verification code”** field and click **“Verify”**.

![Multi-Factor Authentication.](./images/MyCSC/MyCSC_MFA.png)

### 9. Your CSC project is ready!
- Write down your project number, you might need it later (e.g. *project_1234567*).
- Now you can log out from MyCSC and move on to [SD Desktop](#10-log-into-sd-desktop).
___

### 10. Log into SD Desktop
1. Go to login page: **[https://sd-desktop.csc.fi](https://sd-desktop.csc.fi){ target="_blank" }**.
2. Log in with MyCSC-credentials or Haka. Enter your username and password.
3. You need to verify your identity with a second verification step (i.e. Multi-factor Authentication, MFA). Enter the verification code provided via your MFA mobile application (e.g. Google Authenticator)
4. Press *Continue*.

[![Authentication](images/desktop/desktop_login-mfa1.png)](images/desktop/desktop_login-mfa1.png)

### 11. Access the data with SD Desktop
Register data provided by Findata can be accessed on your **virtual desktop** using the **Data Gateway** application. Access is limited to the permit duration specified in the data permit.
!!! warning-label
Team manager
!!! info-label
Team member

- Write down your project number, you might need it later (e.g. *project_1234567*).
- Now you can log out from MyCSC and [login to SD Desktop](sd-desktop-secondary-login.md).

1. [Create virtual desktop](sd-desktop-secondary-create.md)
2. [Access virtual desktop](sd-desktop-secondary-access.md)
3. [Access data with virtual desktop using Data Gateway](sd-desktop-secondary-access.md#accessing-data-using-data-gateway)
* [Manage virtual desktop](sd-desktop-secondary-manage.md)

Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
2 changes: 1 addition & 1 deletion docs/data/sensitive-data/sd-desktop-access.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ When you open the connection, a virtual computing environment will open in your

4. The copy-paste function from your computer/laptop to your virtual desktop is limited for security reasons. [Instructions how to copy-paste](#copy-paste-from-your-laptop-to-virtual-desktop).

5. Only files saved in the shared-directory or the external volume are accessible to all project members via the virtual desktop. Read more about [external volume](./sd-desktop-create.md#3-add-an-external-volume).
5. Only files saved in the shared-directory or the external volume are accessible to all project members via the virtual desktop. Read more about [external volume](./sd-desktop-create.md#3-add-an-external-volume-virtual-external-hard-drive).

### You can close the connection to your virtual desktop in two ways:

Expand Down
27 changes: 10 additions & 17 deletions docs/data/sensitive-data/sd-desktop-audited.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@

# Sensitive Data Desktop for secondary use of health and social data

Sensitive Data (SD) Desktop is a registered environment for secondary use of health and social data (register data). Access to the service requires a permit from data controller which can be Findata or single register. SD Desktop is a web-user interface that allows you to manage (start, use, delete) a virtual computer (here called desktop, technically defined as a virtual machine) from your web browser. With the virtual desktop, you can access the authorised datasets. No previous knowledge of cloud computing or programming expertise is required to use the service.
Sensitive Data (SD) Desktop is a registered environment for secondary use of health and social data (register data). Access to the service requires a permit from data controller which can be Findata or single register. SD Desktop is a web-user interface that allows you to manage (start, use, delete) a virtual desktop (technically defined as a virtual machine) from your web browser. With the virtual desktop, you can access the authorised datasets. No previous knowledge of cloud computing or programming expertise is required to use the service.

Contents:

Expand All @@ -10,8 +10,6 @@ Contents:
* [Limitations](./sd-desktop-audited.md#limitations)

* [Before you start](./sd-desktop-audited.md#before-you-start)

* [Overview](./sd-desktop-audited.md#overview)


## Key features
Expand All @@ -20,42 +18,37 @@ Contents:

* Accessible from any operating system (Mac, Linux or Windows) via web-browser (e.g., Google Chrome, Firefox) from the public internet (without the need of installing a client or using a VPN).

* Only the members of the same CSC project can access the same virtual Desktop.
* Only the members of the same CSC project can access the same virtual desktop.

* After login to SD Desktop, the user can start a pre-built computing environment (Linux OS), on-demand; available options offer the capability of doing simple statistical analysis to machine learning.

* To comply with the regulation, virtual Desktops for secondary use are completely isolated from the internet and other services: you can only access the data you have requested from the data controller;
* To comply with the regulation, virtual desktops for secondary use are completely isolated from the internet and other services: you can only access the data you have requested from the data controller;

* SD Desktop can be used to work with any type of data: text files, images, audio files, video, and genetic data. However, the virtual desktop includes [a limited set of pre-installed software](../../data/sensitive-data/sd-desktop-secondary-access.md#pre-installed-software) (open source). Only the permit authority can approve the use of additional software/files/scripts and import them into your virtual Desktop.

## Limitations

To comply with the regulation, SD Desktop for secondary use is **completely isolated from the internet and other services**. You can, for example, open a Firefox web browser, but you are not able to access any site on the internet.
* To comply with the regulation, SD Desktop for secondary use is **completely isolated from the internet and other services**. You can, for example, open a Firefox web browser, but you are not able to access any site on the internet.

**The import of data and software is restricted in SD Desktop**. You cannot import any data or software yourself for security reasons. If you are working with a dataset for which you have received a permit from the data controller, the only way to access the data for analysis is by utilizing a specific application called **Data Gateway**.
* **The import of data and software is restricted in SD Desktop**. You cannot import any data or software yourself for security reasons. If you are working with a dataset for which you have received a permit from the data controller, the only way to access the data for analysis is by utilizing a specific application called **Data Gateway**.

**Data export from SD Desktop is also restricted**. Only *non-sensitive* results can be exported from the workspace, and those can only be exported by the CSC project manager. Instructions for exporting your results are provided in the next paragraph.
* **Data export from SD Desktop is also restricted**. Only *non-sensitive* results can be exported from the workspace, and those can only be exported by the CSC project manager. Instructions for exporting your results are provided in the next paragraph.

Encrypted files will be **visible in read-only mode**. This solution allows you to process large amounts of data without storing any copy on your virtual Desktop. However, this means that the files cannot be edited in SD Desktop.
* Encrypted files will be **visible in read-only mode**. This solution allows you to process large amounts of data without storing any copy on your virtual desktop. However, this means that the files cannot be edited in SD Desktop.

Lastly, we are not yet providing a virtual Desktop with Windows operating system, or with GPUs. However, we are working on it, and you can find more information on the future developments of the services on our webpage.
* Lastly, we are not yet providing a virtual Desktop with Windows operating system, or with GPUs. However, we are working on it, and you can find more information on the future developments of the services on our webpage.


## Before you start

* You need to have a data permit issued by Findata or single register before starting the service access process at CSC.

* All the members belonging to a specific CSC project can access the same computing virtual Desktop. Currently, it is possible to launch 3 virtual Desktops (or computing environment) for each CSC project. Each CSC project has its private Desktop, and each Desktop is isolated from other CSC projects or CSC accounts.
* All the members belonging to a specific CSC project can access the same computing virtual desktop. Currently, it is possible to launch 3 virtual Desktops (or computing environment) for each CSC project. Each CSC project has its private desktop, and each desktop is isolated from other CSC projects or CSC accounts.

* Audited SD Desktop has few important limitations: the CSC project will be managed by the service desk and the data transfer will be restricted (including user’s own script and programs).

* After your data permit expires, you will no longer have access to your virtual Desktop. To continue working with the same project, you need to send an amendment application to the data controller. Otherwise, make sure to request to export all your results before the validity period of your data permit ends. The expired project and all the data will be deleted after 90 days according to CSC's data retention policy.
* After your data permit expires, you will no longer have access to your virtual desktop. To continue working with the same project, you need to send an amendment application to the data controller. Otherwise, make sure to request to export all your results before the validity period of your data permit ends. The expired project and all the data will be deleted after 90 days according to CSC's data retention policy.

!!! Note
We recommend you to **[contact CSC Service Desk](../../support/contact.md) well in advance**, even before applying for a data permit, if you need **software that is not available** on the Desktop as a default.

## Overview

[![Desktop-overview](images/desktop/desktop-le-overview.png)](images/desktop/desktop-le-overview.png)


Loading