Version 2 (modified by toby, 3 years ago) (diff)


Network Proxies and GSAS-II

Network access is not required for installing or running GSAS-II but it is optimal to have this, because GSAS-II can then be updated to the latest software version. This update process will download only the lines of code that have been changed, so the update is usually very quick, even over slow network connections.

To obtain the latest versions of GSAS-II, a program named subversion (svn) is used to access the APS software server where the code is kept ( If this directory can be seen in a web browser, but running svn fails, it is likely your network is configured to require a network proxy. This is not common at universities, or with commercially-provided internet, but is common for government and corporate sites. When one is needed, it will typically be of form such as If you are not able to get the GSAS-II download to work, you probably need a proxy. Check with your network/computer administrators, but my experience is that the first-line response people rarely have any knowledge about proxies, alas. You may be able to get information from this website: ​ which can detect if your browser is using a proxy.

When the file is run, it will prompt to request the name of the proxy (supply either a name, such as or an IP address, such as The second prompt is for the port number which is typically a two or four digit integer (above 7070). If GSAS-II is installed, this information can also be entered using the File/"Edit Proxy..." menu command.

Proxy Username/Password, etc.

If you have an even more secure network, you may be required to supply even more information, such as an account or password. This can be done by editing the file named proxyout.txt in the main GSAS-II directory that is created when a proxy is entered. In that file additional options to be added to the svn command can be added. Below shows what this file looks like with addition of a proxy account (ABCD) and password (xyz123). Note that this information is being stored in a plain-text file so the security for this information is not high if anyone will have access to your computer.

Note that at present (March 2020, GSAS-II version [4346]), this additional information is processed in GSAS-II, but is not accessed by the file.