Skip to main content

Introduction

Users are the most frequent individuals using the system.

Each user makes a ticrypt account and then waits for its admin to activate their account.

Purpose

tiCrypt's purpose is to help users carry out research in a completely secure and functional environment. Users should use tiCrypt freedom for their benefit by trying various simple operations, in the beginning, to get a feel of the system. i.e: uploading files to Vault to prepare them for VM transfer; starting their own VM for a demo.

Approach

Users can approach the system as their research room for their research needs. They can change the theme, view the team's resources in real-time and simply conduct research in their VMs on their local machine.

Permissions

Each user can see what they are allowed to do in the system and what they are restricted to do by going to My Profile in the top right corner under their user name.

note

Users may also see what teams they are in, what projects they belong to, if they have certifications for certain tasks, and what groups they are part of. All are in the user name section.

Notifications

Users can see messages and updates from their team admins or general admins in the 'notification bell' on the top right near their user name.

It is useful to often check the notification when there is a red number indicating a message or an announcement.

Conduit Behaviour

It is imperative to act cautiously and intelligently when it comes to using tiCrypt. For example, assuming no responsibility when leaving a physical machine open and logged on, could lead to a physical breach that may come from the user's lack of care.

To live in a fully secure environment, users should assume the potential hazards which may come from their research habits.

To start right, users may want to attend the training session on how to use tiCrypt in the first place. This kind of training is usually taught by the system admin or the project leader/ PI.

Virtual machines

During the research, users are in their virtual machines for a consistent amount of time.

info

Research data is saved on the drives attached to user's virtual machine. Not on the virtual machines themselves.

tip

Always make sure at least one drive is attached to a working virtual machine to be able to save one's work.