Accessing the CryoSPARC User Interface
Viewing the user interface locally and from home
By default, CryoSPARC user interface pages are served by a web server running on the same master node where CryoSPARC is installed, at port 39000. This web server is responsible for displaying datasets, experiments, streaming real time results, user accounts, updating, etc.
When you install CryoSPARC, you will be shown details on how to access the interface using the configuration you've provided.
cryoSPARC start message
You connect to this server normally from within your institution network by using your browser and pointing to the correct URL. For example, say you work at an institution with domain
myuniversity.com. If you have installed the CryoSPARC master application on a machine that has a hostname of
uofton your local network you can usually access this as http://uoft:39000 or http://uoft.myuniversity.com:39000
If you are physically using the same machine as the master node to interact with the CryoSPARC interface, you can connect to it as: http://localhost:39000
Typical network setup for a CryoSPARC user
When you are working from a remote network, you will usually not have direct access to the master node to use CryoSPARC as you usually would.
Often, the master CryoSPARC server may be behind a firewall, within a local network (LAN) at your institution. Only other machines that are on the same local network can connect to the master server at port 39000.
Most institutions offer Virtual Private Network (VPN) capability which can allow you to connect to the institution's local network as if you are physically present at the office. There are different types of VPN connections, but most will allow you, once logged in, to connect to the CryoSPARC master server as you usually would, using your browser.
In some cases, your VPN may only allow certain types of connections, or your institution may allow for access over only some secure ports to your CryoSPARC master server, without a VPN log in. In both of these cases, if you are able to find a way to connect to your CryoSPARC master server using
SSH, it is still possible to use CryoSPARC, even if you cannot connect to port 39000 as you usually would.
When you want to access CryoSPARC from home or elsewhere to be able to run jobs and view results, it can be convenient to connect to the web server via an SSH tunnel. SSH tunneling is a method of transporting arbitrary networking data over an encrypted SSH connection.
SSH is a standard for secure remote logins and file transfers over untrusted networks. It also provides a way to secure the data traffic of any given application using port forwarding, basically tunneling any TCP/IP port over SSH. This means that the application data traffic is directed to flow inside an encrypted SSH connection so that it cannot be eavesdropped or intercepted while it is in transit. Source: SSH Tunnel
You may need to use a Virtual Private Network (VPN) client to connect to your institution's VPN in order to access the local network.
If you can use SSH to connect to the CryoSPARC master instance, you can run an SSH command to forward the port of your remote instance to your local machine.
- 1.Start an SSH tunnel to expose a port (by default, 39000) from your master node to your local machine.ssh -N -f -L localhost:39000:localhost:39000 remote_hostnameNote: the
sshto run in the background, so you can close the terminal window after running this command, and the tunnel will stay open. Note: You can set up password-less SSH access so you don't have to specify a username and password every time you try to SSH to a known server. See Appendix A for more details.
See Appendix B and C for arguments to this command that allow you to save bandwidth and increase performance via hardware acceleration.
Now, open your browser (Chrome) on your local machine and navigate to
http://localhost:39000. You should be presented with the CryoSPARC login page.
cryoSPARC UI login page
If your CryoSPARC instance is running on a server that is only accessible via another server (e.g., an SSH server, or a cluster edge node), you will have to run an SSH command that forwards the port through multiple machines.
- 1.Set up a multi-hop connection from your local host to the remote host. To do this, open the file
~/.ssh/config(or create it if it doesn't exist) and add the following lines:Host *ServerAliveCountMax 4ServerAliveInterval 15Host local_name_for_remote_hostHostName remote_hostnameUser remote_usernameProxyCommand ssh -q [email protected]_server -W %h:%p
local_name_for_remote_hostwith a short name you will use to refer to the remote compute node.
remote_hostnamewith the actual user/hostname of the compute node that you would use to connect to it from the ssh server.
ssh_serverwith the user/hostname of the ssh server.
- Save the file.
- 2.Start an SSH tunnel to expose port 39000 from your compute node to your local machine.ssh -N -f -L localhost:39000:localhost:39000 local_name_for_remote_hostNote: the
sshto run in the background, so you can close the terminal window after running this command, and the tunnel will stay open.Note: You can set up password-less SSH access so you don't have to specify a username and password every time you try to SSH to a known server. See Appendix A for more details.
- 3.Now, open your browser (Chrome) and navigate to
http://localhost:39000. You should be presented with the CryoSPARC login page.
If you're using Windows, you can still take advantage of SSH Tunneling by using an SSH client like Putty. See here for instructions on how to set up SSH Tunneling using Putty
Refer to the following guide for more information on hosting the CryoSPARC web application via a reverse proxy server:
Set up SSH keys for password-less access (only if you currently need to enter your password each time you ssh into the compute node).
- 1.If you do not already have SSH keys generated on your local machine, use
ssh-keygento do so. Open a terminal prompt on your local machine, and enter:ssh-keygen -t rsa -N "" -f $HOME/.ssh/id_rsaNote: this will create an RSA key-pair with no passphrase in the default location.
- 2.Copy the RSA public key to the remote compute node for password-less login:Note:
remote_hostnameare your username and the hostname that you use to SSH into your compute node. This step will ask for your password.
-Cto the port tunnelling command to request compression of all data. This can help when downloading maps from the CryoSPARC UI, as masks can be greatly compressed. From
-C Requests compression of all data (including stdin, stdout, stderr,
and data for forwarded X11, TCP and UNIX-domain connections).
The compression algorithm is the same used by gzip(1), and the
“level” can be controlled by the CompressionLevel option for
protocol version 1. Compression is desirable on modem lines and
other slow connections, but will only slow down things on fast
ssh -N -f -L localhost:39000:localhost:39000 remote_hostname -C
If your system supports Intel or AMD AES-NI, you can take advantage of hardware accelerated ciphers that dramatically improve the performance of your SSH connection. To find out if your system supports this, follow this tutorial.
If your system has these features enabled, supply the argument
-o [email protected]or
-o [email protected](depending on what your system supports, but AES 256 is preferred) to the port forwarding command. For example:
cryoSPARC requires internet access from the main process to verify your license and perform updates. At minimum, CryoSPARC should have access to our license server at
On some older systems, or if your system is behind a HTTP proxy, CryoSPARC may have trouble getting the required SSL certificates to validate this requires. If you have a Certificate Authority (CA) bundle on your system, you may specify its path for CryoSPARC to use and apply.
Add the following line to
/path/to/cabundlewith the path to the CA bundle on your system):