Skip to main content

Frontend Fundamentals

tiCrypt Frontend Overview

The front end of tiCrypt is the sole heart of the user experience.

The tiCrypt team has worked hard in developing a highly sophisticated complex fully encrypted backend with yet a simple and user-friendly frontend. tiCrypt users have complete freedom in the frontend to either use command prompts to access their VMs or simply use the tiCrypt user interface to carry out tasks. Users are given power in the system to manage their own world via permissions and features.

When it comes to permissions, both sub-admins and admins have large customization. There are 2 at the power 56 combinations of permissions available per user.

Frontend has three main tabs on the top left, each having its sections:

- Files, Users, Groups, Projects.
tiCrypt Frontend Tabs

Each tab will show up based on the user permissions. Example: Some users may be shown only the Vault and Virtual Machines tab, while others the Management tab only.

On the right, there are three sections which correspond to each user profile:

- My profile, My profile Picture, Theme, My Teams' Resource Usage, Suspend, Change Password, Logout.
tiCrypt Frontend Menu

Profiles of each user may be personalized by theme or role.

At the page bottom, there are three areas that have to do with product licensing & compliance:

- Frontend changelog of all tiCrypt frontend (f), backend (b) and connect app (c) versions.
tiCrypt Frontend Footer

Automatic frontend version updates will always show up in the Access changelog.

tiCrypt Connect Summary

The tiCrypt Connect application allows a user to connect to the secured tiCrypt frontend.

tiCrypt connect will be installed on the users' local machine; using their Mac, Windows or Linux desktop users can connect to the tiCrypt frontend.


To learn how to install tiCrypt on your local machine please read the create a new tiCrypt account section.

If you are an admin who would like to onboard new users check out the onboard new users section.

The Frontend of tiCrypt includes separate hidden parts only accessed by escrow users and site-key admin.