Last updated: April 11, 2026Latest Frontend Version: 2.16.8
tiCrypt Documentation
This documentation covers installation, configuration, usage, and administration of tiCrypt.
Where to Start
| If you are a... | Start here | What you'll find |
|---|---|---|
| New user | Getting Started | Installing tiCrypt Connect, registering an account, and logging in for the first time |
| Researcher | User Guide | Working with files, virtual machines, SLURM batch processing, and account settings |
| Administrator | Admin Guide | Managing users, teams, projects, audit logs, and key escrow |
| System administrator | Server Installation & Configuration | Deploying the tiCrypt backend, configuring services, and setting up VM hosts |
| Security evaluator | Security Whitepaper | Technical overview of tiCrypt's security architecture and cryptographic implementation |
Additional Resources
- Articles — deep dives into tiCrypt's architecture and technical capabilities
- Release Notes — version history for all tiCrypt components
- User Roles — role permissions and scope