Armis2 Frequently Asked Questions

1. What is Armis2?

Armis2 is an ARC-TS managed HPC cluster available for researchers who work with Protected Health Information (HIPAA). All computational work is scheduled via the Slurm resource manager and task scheduler, while data is kept on Turbo Research Storage. To request an allocation please contact

2. Who can use Armis2?

Armis2 is available for researchers at the University of Michigan who require HIPAA-compliant high performance computing. If you do not work with HIPAA data, your needs may be met by other ARC-TS services (i.e., Great Lakes or Lighthouse).

3. What forms do I need to fill out?

  1. The Principal Investigator (PI) needs to request a Slurm account, specifying users that can access the account and payment details.
  2. Each user given access to the account must request a user login.  Please refer to the Armis2 User Guide for additional steps and usage information.

4. How much does Armis2 cost?

Currently, there is no charge for using Armis2.  Armis2 has an on-demand job model, paying for the resources your job uses, and there will be a rate applied on January 6th, 2020. For current prices, see the HPC rates page.

5. As a PI, how can I limit usage on my account?

Principal Investigators can request that CPU, GPU, memory, billing units, and walltime be limited per user or group of users on their account.  For more information, see the Armis2 policy documentation.

Limits must be requested by emailing

6. How can I get a trial account on Armis2?

If you are a PI that hasn’t used Armis2 before, you are eligible for a limited trial account.  This account will have $150 worth of cluster time (see the rates page) and will be unable to run jobs after 1 month.  If interested, please contact specifying that you’d like a trial account with lists of users and admins.

7. What are the SSH pub keys for Armis 2?

If you wish to pre-populate your SSH client configuration with the publicly available keys for Armis 2, they are as follows:

ECDSA:,armis2-login?,, ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBHWel/rAXqIJYxexVzMSlgy/fICWukn8DaOGMPpAomH1E5AhCjrH2zMMTJHtXYsRA+brm/sTbn21Zw+pgpgJSYA=


ED25519:,armis2-login?,, ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICwaAq9LI48vVO4qbt35Xfz1pi+RE1Krq1iIeJQqoFEw


RSA:,armis2-login?,, ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEA16eDiBWF3SgPQXEeJsH8dsxO8x3o5KkdqWMg/lK57Kpwf4QGXJNvYy0jxSAuKTRim/ob6+nDRH8zIOwnl9tlyEw+8VN3WR8nqBqxX6Km2yzTOMO8Lh7fLuMTZHOdEz0uOn6tBP8LTMtHN9h/fANjKFVl8N+jsejMXrPf0w7jGjc=


On a Mac or Linux machine you’ll add the keys to your known_hosts file.

On a Mac this file is: /Users/<username>/.ssh/known_hosts.
On Linux: /home/<username>/.ssh/known_hosts.

The known_hosts file should have 644 (i.e. -rw-r--r--) permissions.

If you are using an SSH client that is not part of your operating system (e.g. Windows using PuTTY), please see the client documentation referring to host key verification.
A good start for PuTTY users can be found here (section A.2.9 “Is there an option to turn off the annoying host key prompts?)”


If you have questions, please send email to

Order Service

To request an account, please email us at

Users need to request a user login to access the cluster. All users must have been granted access to an account before a user login can be created. Be sure to have a shortcode that you are authorized to use, a list of uniqnames of the users who should be able to use the account. a list of uniqnames of the administrators who are authorized to make changes to the account. If you had a pilot account, you can optionally use the same administrative group, the school or college you are a part of, and any limits that you want to set on the account (such as a spending limit or resources usage limits).

If you have questions about gaining access to an account (or getting a trial account), please email

Please see the Terms of Usage for more information.

Related Events

There are no upcoming events at this time.