Skip to main content

Guidance Document - EXRC Access Request Process


In order to establish a documented and uniform process whereby project personnel engaged in research that requires EXRC can properly request access to the cluster. This process is meant to minimize unnecessary communications, decrease time to resolution, and ensure security requirements are met to provide access to needed resources.


Any Purdue University projects that require access to the EXRC Cluster.


It is the policy of Purdue University (i) to comply with all Export Controls and OFAC (U. S. Department of Treasury Office of Foreign Assets Control) Regulations applicable to University activities, and (ii) to develop and maintain an EC Compliance program to enable Purdue Associates to understand and comply with these laws and regulations. No Purdue Associate may engage in any activity, or commit the University to engage in any activity, (i) that is prohibited by Export Controls or OFAC Regulations, or (ii) that requires a license or other agency approval under Export Controls or OFAC Regulations, unless such license or approval has been obtained.

Roles & Responsibilities

Primary Investigator – Instruct the project participates needing EXRC cluster access to generate an SSH key pair using these instructions:

* When following these instructions, please select RSA key and 2048 key length to minimize issues.

Using the RCAC user management website, add the personnel to the desired workgroups.

Access Requester – After generating an SSH key pair using the preceding instructions, attach and email the generated public key to IT Security & Policy ( In the email include project / TCP name, justification, and directory path requested for access. The PI should be able to provide this information.

IT Security Research Analyst – Verify with Export Control to ensure the individual requesting access has met the prerequisite citizenship and training requirements. Send an email to with the subject line EXRC access request – (PI Name) and the requested access in the body. On confirmation that conditions for access are met, update the request to proceed with access and add Research Computing support to assignees. If requirements are not met, update the request as to what is needed to proceed.

Export Control – Conduct investigation including but not limited to data security training, citizenship verification, and background check. Once the investigation is complete, communicate the status to the Research Security Analyst.

RCAC – On receipt of:

  • Request for access
  • Key pair
  • Confirmation of export security requirements

Process the request for access to EXRC and close the request.

Management Commitment

Purdue University maintains a campus wide commitment and management support for the security of our infrastructure and data to include public facing infrastructure, sensitive data projects, and everything in between.


This process depends on the continued coordination between IT Security and Policy, Export Control Administration, ITaP Research Computing, and participating colleges engaged in export-controlled research projects.

Need Help?

Contact the Purdue Export Controls team by email at, by phone at (765) 494-6840, or in person on the 10th floor of Young Hall (155 S Grant St.).

Purdue University, West Lafayette, IN 47907 (765) 494-4600

© 2022 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by Office of the Executive Vice President for Research and Partnerships

If you have trouble accessing this page because of a disability, please contact Office of the Executive Vice President for Research and Partnerships at