Skip to main content

How do I use the global filter panel in tiCrypt?

Each section in the tab allows filtering the data. Filtering includes:

  • . function selects all the visible entries of the section.
  • . Remove all filters from current table function cleans all filtering of the section in the management tab.
  • . Remove all column customization function removes all column and panel edits globally, turning all changes back to default. e.g.. adjusting panel widths, sorting tables, resizing columns, hidden columns, and multi-sorting.
Clicks per columnAction
OnceSort column ascending.
TwiceSort column descending.
Three timesRemove filter.
tiCrypt Filter Panel Overview

The following filters are applied based on the section name.

Users Section

Users

FilterExampleDescription
Login IDjohn.smith@terainsights.comUnique user ID.
First nameJohnUser's first name.
Last nameSmithUser's last name.
ProfileCustom (32 perms)User profile name or custom permission amount.
RoleSub-adminUser role in the system.
StatusNew,not activatedUser account activation state.
Teams4 teamsTotal number of the user's teams.
Deactivation reasonFailedPasswordReason for which the account is inactive.
Contact emailjohn.smith@gmail.comUser's personal or business email.
Can Escrow"" or ""Whether or not the user can escrow.
Users Additional Notes
  • Profile is a custom field with either:

    • Custom n perm: a manual number of permissions with an unnamed user profile.
    • [Your given profile name]: a manually given profile name with a manually given number of permissions.
  • Status depends on the escrowing abilities:

    • Deactivated: The user can no longer log in.
    • Escrow upon login: The user allows private key escrowing on the next login.
    • New, escrow upon login: The user will log in for the first time, allowing private key escrowing.

To learn more about escrowing navigate to the set up a user escrow key section.

  • Deactivation reason may come from the following:
    • Admin: if the admin deactivated the user manually.
    • Failed password: if the user fails to enter the correct password multiple times.
    • Timeout: if the user has not logged in for an extended period.
    • XSS: technical issues.
    • Registration: The account is new and not yet activated.

Deleted Users

FilterExampleDescription
Emailjoe.doe@terainsights.comUnique user ID.
First nameJoeDeleted user's first name.
Last nameDoeDeleted user's last name.
DeletedOct 23, 2022The date the user has been deleted.
Deleted bySteven AdminThe full name of admin who performed the deletion.

Sub-admin Managed Objects

FilterExampleDescription
ManagerGabrielle JohnsonFull sub-admin name.
ObjectResearch A123Full name of the object.
TypeprojectWhether the object is a project or a team.

User Profiles

FilterExampleDescription
NameEngineering ManagerFull name of the user profile.
RoleAdminRole of the user profile in the system.

Resources by User

FilterExampleDescription
UserBrian DollyFull name of the user.

Teams Section

Teams

FilterExampleDescription
NameJunior ResearchersFull name of the team.
Risk assessment ID10323341Serves the teams tagging purpose.
Additional Notes
  • Risk assessment ID may include:
    • Characters.
    • Letters.
    • Numbers.

It does not affect any system functions since it is purely designed for tagging management purposes.

Team Memberships

FilterExampleDescription
TeamSenior ResearchersFull name of the team.
UserBrian DollyFull name of the user belonging to the team.

Projects Section

Security Requirements

FilterExampleDescription
RequirementDrivers LicenseName of the security requirement.
TypeUserCertType of requirement.
LevelsValid US PermitName of the security levels associated with the requirement.
Additional Notes
  • Type of requirement is currently linked to User certifications. This can be customized based on your organization's needs.

Security Levels

FilterExampleDescription
NameHIPAAName of the security level.
RequirementsCertified ResearcherType of requirement.

Projects

FilterExampleDescription
NameResearch A123Name of the project.
PIBilly WilliamsFull name of the Personal Investigator.
LevelHIPAAName of the security level optionally tagging the project.
ParentResearch AName of the parent project if present.

Project Memberships

FilterExampleDescription
ProjectResearch A123Name of the project.
UserBilly WilliamsFull name of the Personal Investigator.
Manager"" or ""Whether or not the user is a manager of the project.
RestrictionsDownloadWhether the user can view or download the project contents.

User Certifications

FilterExampleDescription
RequirementDriver LicenseName of the security requirement.
UserJohn SmithFull name of the certified user.
Modified byGabrielle JohnsonThe manager's full Name who made the last edit.
Additional Notes
  • Modified by: implies sub-admin's responsibility for editing the user certificates. This usually falls on either the PI or the project manager, and it is fully audited at all times.

Resources by Project

FilterExampleDescription
ProjectResearch A123Name of the project associated with the displayed resources.

Virtual Machines Section

Realms

FilterExampleDescription
NameAWSName of the realm.
DriverLibvirtDriver software of the realm.

Libvirt Hosts

FilterExampleDescription
NametiedgeName of the host.
RealmLibvirtName of the realm.
StateEnabledCurrent state of the host.
Connected"" or ""Whether or not the host is connected to the realm.
URIurn:oasis:names:specification:docbook:dtd:xml:4.1.2The host's uniform resource identifier.
Hardware ProfiletimonsterThe name of the hardware profile associated with the host.

Hardware Profiles

FilterExampleDescription
NametimonsterName of the hardware profile.
RealmLibvirtName of the realm.
Devices1 X gpu-nonexistent, 1 X gpu-nvidiaName and quantity of hardware devices.

Libvirt Storage Pools

FilterExampleDescription
NametimonsterName of the storage pool.
RealmLibvirtName of the realm.
TypeDrivesName of the hardware device.
Locationstorage/libvirt-ticrypt-poolsLocation of the storage pool on the server.
Additional Notes
  • Type of storage pools may be the following:
    • Drives
    • Bricks
    • Volumes
    • Images
    • IOSs
    • Other

Libvirt Volumes

FilterExampleDescription
RealmLibvirtName of the realm.
Poolticrypt-bricksName of the associated storage pool.
Volumestorage/libvirt-ticrypt-poolsLocation of the storage pool on the server.

VM Images

FilterExampleDescription
NameLibvirt ProductionName of the VM Image.
Parentvm-image:8712301230Name of the parent VM Image.
TypeLinuxOperating system type.
Infostorage/libvirt-ticrypt-poolsLocation of the VM image on the server.

VM Hardware Setups

FilterExampleDescription
NameLibvirt ProductionName of the VM Hardware setup.
Debug""Whether or not debugging is enabled.
RealmLibvirtType of the realm.
ImageUbuntu001Name of the VM image.
Operating System (Os)WindowsName of the operating system.
Devicegpu-nonexistent3Name and quantity of current devices.
Created byJohn SmithName of the VM Hardware creator.

VM Configurations

FilterExampleDescription
NameLinux VMName of the VM configuration.
StateRunningThe current state of the VM configuration.
Owner(s)Jack DoeOwner name of the VM configuration.
VM SetupWinServerName of the VM setup for this configuration.
ProjectResearch A123Name of the project that tags the VM configuration.
TeamSenior ResearchersName of the team operating the VM configuration.
Virtual MachineCentOS1234Name of the virtual machine.
Fixed MAC00:1b:63:84:45:e6Address of the MAC device.
Additional Notes
  • State can have multiple forms as follows:
    • Stopped: The VM has been stopped by its owner.
    • Starting: The VM is in the process of starting.
    • Running: The VM is currently running normally.
    • Suspended: Its users have manually suspended the VM.
    • Stopping: The VM is in the process of stopping.
  • Virtual Machine indicates the real name of the VM. Each VM Configuration is similar to a virtual "arrangement." which allows access to the real virtual machine.

Running VMs

FilterExampleDescription
NameLinux VMName of the running VM configuration.
OwnerJack DoeOwner name of the running VM configuration.
ProjectResearch A123Name of the project that tags the running VM configuration.
TeamSenior ResearchersName of the team operating the running VM configuration.
Debug""Whether or not debugging is enabled.
Conn"" or ""Whether or not the running VM is connected.
VM Hardware SetupCentOS-123Name of the VM Hardware Setup of the running VM configuration.
VM ID130iiuy-9281-40ojh-m7y2Name of the VM identification number.
Host ServerticryptName of the hosting server.
IP Adress192.158.1.38.Name of the IP address where the running VM is registered.
MAC Address00:1b:63:84:45:e6Address of the MAC device.

Past VMs

FilterExampleDescription
NameWindows VMName of the past VM configuration.
OwnerJoe DoeOwner name of the past VM configuration.
TeamJunior ResearchersName of the team operating the past VM configuration.
Debug""Whether or not the debugging is enabled.
VM Hardware SetupCentOS-123Name of the VM Hardware Setup of the past VM configuration.
Host ServerticryptName of the host server.
IP Adress192.158.1.38.Name of the IP address where the past VM was registered.
MAC Address00:1b:63:84:45:e6Address of the MAC device.

Service VMs

FilterExampleDescription
NameWindows VMName of the service VM configuration.
OwnerJoe DoeOwner name of the service VM configuration.
Active""Whether or not the service VM configuration is active.
ImageUbuntu123Name of the VM Image for the service VM configuration.
Host ServerticryptName of the host server.
IP Adress192.158.1.38.Name of the IP address where the service VM is registered.
MAC Address00:1b:63:84:45:e6Address of the MAC device.

Drives

FilterExampleDescription
NameOffice DriveName of the drive.
OwnerJoe SmithOwner name of the drive.
ProjectResearch A123Name of the project that tags the drive.
TeamDesk ResearchersName of the team operating the drive.
ID145erpl-23vssd-9123s-mn1091Drive Identification number.
Formatext4Format type of the drive.
TyperawThe type of storage for the drive.
Poolticrypt-drivesThe storage pool where the drive lives.
Additional Notes
  • Type of the drive may be as follows:
    • raw: The drive defaults at this state. The storage behaves like an external hard drive or thumb drive.
    • qcow2: The drive is copy-on-write. The physical storage layer is separated from the virtual storage layer.

ISO Images

FilterExampleDescription
NameRocky8 ProductionName of the ISO image.
RealmLibvirtName of the realm of the ISO image.
OwnerGabrielle JohnsonOwner name of the ISO image.
File9123nkas94qjdrlwkty78n12k4po1012Name of the ISO file.
Bootable"" or ""Whether or not the ISO image is bootable.
Service"" or ""Whether or not the ISO image is in service.

Licensing Servers

FilterExampleDescription
Servergoogle.comName of the licensing server.
Ports8080,1234The ports of the licensing server.
ProtocoltcpType of server protocol.
Active"" or ""Whether or not the licensing server is active.
GroupFront-end EngineersName of the group responsible for the licensing server.
Created byEmily SmithCreator name of the licensing server.
Additional Notes

Protocol may be as follows:

  • TCP: Transmission Control Protocol.
  • UDP: User Datagram Protocol. You may select one of the two currently existing protocols.

Escrow Section

Escrow Users

FilterExampleDescription
UserAlin DobraName of the escrow user.
Emailalin.dobra@terainsights.comEscrow user's email.
GroupsCEOThe escrow group of the escrow user.
StatusActiveThe current escrow user status.
DepartmentITThe department of the escrow user profile.
PositionChiefThe position of the escrow user profile.
Additional Notes

Status of the escrow users may be the following:

  • Active: The escrow user is active and working usually.
  • Inactive: The escrow user is inactive and no longer has escrow responsibility.
  • Locked: The escrow user has been locked for security reasons.

Escrow Certificates

FilterExampleDescription
Typeold-escrow-groupName of the escrow grup.
Signed byAlin DobraThe full name of the escrow certificate signee.
Additional Notes

The type of the escrow certifications may be the following:

  • new-escrow-public-key
  • new-escrow-group
  • list-escrow-groups
  • get-escrow-group-by-id
  • add-key-to-escrow-group
  • list-escrowed-keys-for-user
  • get-escrowed-key-by-id
  • get-users-with-escrowed-keys
  • get-recovery-key-set
  • get-recovery-key-sets-for-escrow
  • retrieve-recovery-key
  • add-recovery-key
  • add-escrow-user
  • get-escrow-user-by-id
  • list-all-escrow-users
  • get-own-escrow-user
  • get-escrow-public-key-by-id
  • get-escrow-public-keys-for-user
  • create-inbox
  • delete-escrow-user

Miscellaneous Section

System Services

FilterExampleDescription
NameAccess ServiceName of the system service.
Serviceticrypt-serviceBackend name of the service.
Running"" or ""Whether or not the service is running.
DescriptionResponsible for service of all system.The description of the service.

Audit Logs

FilterExampleDescription
TypeVR01Type of the audit log.
Arg 1trueArgument 1.
Arg 2falseArgument 2.
Arg 31234Argument 3.
.........
Arg 20trueArgument 20.

System Settings

The section has a search bar in the top right allowing keyword searches.