Data Ingress Into tiCrypt
tiCrypt's security whitepaper focuses on protecting data after it enters the secure enclave. In deployment and day-to-day operations, however, administrators and research consultants typically start with a more practical question:
How does data enter tiCrypt?
tiCrypt supports multiple user and system-administrator-initiated ingress methods. Each method is designed for a specific set of constraints—dataset size, sender identity (internal vs. external), operational ownership, and the degree of directness in data destination.
Evaluating Criteria to Decide Which Method Should Be Used
When selecting an ingress option, teams typically weigh:
- Data volume and cadence (one-time migration vs. recurring drops vs. iterative refresh)
- Sender model (tiCrypt user vs. external collaborator without tiCrypt credentials)
- Landing zone (User's Vault or direct-to-VM placement)
- Operational ownership (researcher self-service vs. administrator-managed intake)
User-Initiated Data Ingress Methods
Local Upload (to User's Vault)
Local Upload allows a tiCrypt user to upload files from a local workstation directly into their Vault. This method requires an active tiCrypt login session.
Primary advantages
- Streamlines small to moderate datasets and ad hoc inputs.
- Fits well for interactive workflows (scripts, configuration files, reference datasets, incremental additions) stored on the local workstation and used within a secure VM.
Operational considerations
- This method requires an active session, so it's not suited for unattended or automated ingestion.
- Upload speed depends on the user's workstation network connection, so this method is not recommended for migrating very large datasets (multi-terabyte scale).
- Uploaded data lands in the Vault, to be moved as needed for research use to specific VMs.
Inboxes (External Collaborator Drop to User's Vault)
An Inbox is a designated directory within a user's Vault that can be exposed via an access point, allowing external collaborators to submit data without tiCrypt credentials. Inboxes are governed by configurable constraints and a sender-facing submission mechanism.
Inbox access points are commonly configured with:
- Maximum total upload size
- Expiration date
- Sender message/instructions
- Transfer method (URL upload or SFTP upload)
URL vs SFTP Modes
URL Upload
URL Upload generates a sender-facing web link that allows an external collaborator to upload data using a standard web browser, without requiring a tiCrypt account.
Primary advantages
- Lowest barrier to entry for external collaborators (browser-only workflow).
- Well-suited to time-boxed collection windows (e.g., controlled intake deadlines).
- Preserves the enclave boundary by enabling intake without credential issuance.
Operational considerations
- Browser uploads work for small to moderate amounts of data, but are not ideal for large or automated transfers.
- After upload, the tiCrypt users review and move the data per workflow needs.
SFTP Upload
SFTP Upload provides sender-specific SFTP credentials (delivered via an Inbox URL) that allow external collaborators to upload using any standard SFTP client, without requiring tiCrypt credentials.
Primary advantages
- Better fit for structured transfers and repeatable client workflows (standard tools, predictable behavior).
- More compatible with automation and larger datasets than browser uploads in many environments.
- Retains the governance benefit of external intake without expanding the user account boundary.
Operational considerations
- Senders need an SFTP client or must add credentials to scripts, which increases complexity compared to browser uploads.
- Inbox stores data only; users move it into VMs for analysis.
Note: Inboxes are frequently the preferred option for third-party intake because they support lifecycle controls (size limits, expiration) while avoiding the distribution of credentials to external collaborators.
Direct SFTP to VM
Direct SFTP to VM enables an authenticated tiCrypt user with access to the target VM and the required permissions to generate SFTP credentials that push data directly into that VM. This method requires the tiCrypt application to be running on the sending machine and an active VM connection to facilitate the secure pathway.
Primary advantages
- Minimizes staging by placing data directly into the compute environment, supporting rapid iteration.
- Effective for workflows that require frequent incremental updates (e.g., iterative inputs during active analysis).
- Supports SFTP from either a workstation or server, provided the session requirements are met.
Operational considerations
- Active user login and an established VM connection are required; therefore, this method is not suitable for automated transfers that must proceed without user interaction.
- Best for VM co-owners/Managers with full drive access; basic users are limited to their home folder and directories to which they have been given access.
System Administrator-Initiated Data Ingress Methods
External Drive Builder
External Drive Builder creates a virtual drive outside of tiCrypt that can be populated by an administrator (or authorized operator) and then sealed using a manifest file. Sealing encrypts the drive and binds decryption/mounting rights to the user specified in the manifest. The sealed drive is then moved into the configured drive pool and made available within tiCrypt.
Primary advantages
- Best suited for large-scale data migration (5 TB+ datasets)
- Enables a clear operational chain: prepare → seal → move → attach to VM, resulting in a complete drive ready to be used in the tiCrypt environment
- Drive can be built outside the tiCrypt environment.
Operational considerations
- Often preferred for project data seeding and large dataset migrations.
NFS Mounts Within Specific VMs
Definition: NFS Mounts allow administrators to configure NFS access within specific VMs so data can be copied from institutional or project storage into secured storage used within the enclave (for example, encrypted drives attached to VMs).
Primary advantages
- Leverages existing institutional storage systems and established access patterns.
- Useful for scenarios where the external storage remains the source of truth and teams perform controlled copy-in to secured storage as needed.
- Can reduce migration friction for teams transitioning established pipelines into an enclave workflow.
Operational considerations
- Scope control is key; administrators should set clear access and duration criteria per VM.
- Governance should focus on the mount lifecycle, access minimization, and operational review.
| Scenario | Recommended method |
|---|---|
| Small, ad hoc researcher uploads | Local Upload |
| External collaborators without tiCrypt accounts | Inboxes (URL for browser simplicity; SFTP for repeatable client workflows) |
| Active research sessions requiring compute-ready placement | Direct SFTP to VM |
| Large-scale onboarding (5 TB+), packaged delivery, and migrations | External Drive Builder |
| Institutional storage bridge with controlled copy-in | NFS Mounts Within Specific VMs |

