How do I use the global filter panel in tiCrypt?
Each section in the tab allows filtering the data. Filtering includes:
- . function selects all the visible entries of the section.
- .
Remove all filters from current table
function cleans all filtering of the section in the management tab. - .
Remove all column customization
function removes all column and panel edits globally, turning all changes back to default. e.g.. adjusting panel widths, sorting tables, resizing columns, hidden columns, and multi-sorting.
Clicks per column | Action |
---|---|
Once | Sort column ascending. |
Twice | Sort column descending. |
Three times | Remove filter. |
The following filters are applied based on the section name.
Users Section
Users
Filter | Example | Description |
---|---|---|
Login ID | john.smith@terainsights.com | Unique user ID. |
First name | John | User's first name. |
Last name | Smith | User's last name. |
Profile | Custom (32 perms) | User profile name or custom permission amount. |
Role | Sub-admin | User role in the system. |
Status | New,not activated | User account activation state. |
Teams | 4 teams | Total number of the user's teams. |
Deactivation reason | FailedPassword | Reason for which the account is inactive. |
Contact email | john.smith@gmail.com | User's personal or business email. |
Can Escrow | "" or "" | Whether or not the user can escrow. |
Users
Additional NotesProfile
is a custom field with either:Custom n perm
: a manual number of permissions with an unnamed user profile.[Your given profile name]
: a manually given profile name with a manually given number of permissions.
Status
depends on the escrowing abilities:Deactivated
: The user can no longer log in.Escrow upon login
: The user allows private key escrowing on the next login.New, escrow upon login
: The user will log in for the first time, allowing private key escrowing.
To learn more about escrowing navigate to the set up a user escrow key section.
Deactivation reason
may come from the following:Admin
: if the admin deactivated the user manually.Failed password
: if the user fails to enter the correct password multiple times.Timeout
: if the user has not logged in for an extended period.XSS
: technical issues.Registration
: The account is new and not yet activated.
Deleted Users
Filter | Example | Description |
---|---|---|
Email | joe.doe@terainsights.com | Unique user ID. |
First name | Joe | Deleted user's first name. |
Last name | Doe | Deleted user's last name. |
Deleted | Oct 23, 2022 | The date the user has been deleted. |
Deleted by | Steven Admin | The full name of admin who performed the deletion. |
Sub-admin Managed Objects
Filter | Example | Description |
---|---|---|
Manager | Gabrielle Johnson | Full sub-admin name. |
Object | Research A123 | Full name of the object. |
Type | project | Whether the object is a project or a team. |
User Profiles
Filter | Example | Description |
---|---|---|
Name | Engineering Manager | Full name of the user profile. |
Role | Admin | Role of the user profile in the system. |
Resources by User
Filter | Example | Description |
---|---|---|
User | Brian Dolly | Full name of the user. |
Teams Section
Teams
Filter | Example | Description |
---|---|---|
Name | Junior Researchers | Full name of the team. |
Risk assessment ID | 10323341 | Serves the teams tagging purpose. |
Additional Notes
Risk assessment ID
may include:- Characters.
- Letters.
- Numbers.
It does not affect any system functions since it is purely designed for tagging management purposes.
Team Memberships
Filter | Example | Description |
---|---|---|
Team | Senior Researchers | Full name of the team. |
User | Brian Dolly | Full name of the user belonging to the team. |
Projects Section
Security Requirements
Filter | Example | Description |
---|---|---|
Requirement | Drivers License | Name of the security requirement. |
Type | UserCert | Type of requirement. |
Levels | Valid US Permit | Name of the security levels associated with the requirement. |
Additional Notes
Type
of requirement is currently linked to User certifications. This can be customized based on your organization's needs.
Security Levels
Filter | Example | Description |
---|---|---|
Name | HIPAA | Name of the security level. |
Requirements | Certified Researcher | Type of requirement. |
Projects
Filter | Example | Description |
---|---|---|
Name | Research A123 | Name of the project. |
PI | Billy Williams | Full name of the Personal Investigator. |
Level | HIPAA | Name of the security level optionally tagging the project. |
Parent | Research A | Name of the parent project if present. |
Project Memberships
Filter | Example | Description |
---|---|---|
Project | Research A123 | Name of the project. |
User | Billy Williams | Full name of the Personal Investigator. |
Manager | "" or "" | Whether or not the user is a manager of the project. |
Restrictions | Download | Whether the user can view or download the project contents. |
User Certifications
Filter | Example | Description |
---|---|---|
Requirement | Driver License | Name of the security requirement. |
User | John Smith | Full name of the certified user. |
Modified by | Gabrielle Johnson | The manager's full Name who made the last edit. |
Additional Notes
Modified by
: implies sub-admin's responsibility for editing the user certificates. This usually falls on either the PI or the project manager, and it is fully audited at all times.
Resources by Project
Filter | Example | Description |
---|---|---|
Project | Research A123 | Name of the project associated with the displayed resources. |
Virtual Machines Section
Realms
Filter | Example | Description |
---|---|---|
Name | AWS | Name of the realm. |
Driver | Libvirt | Driver software of the realm. |
Libvirt Hosts
Filter | Example | Description |
---|---|---|
Name | tiedge | Name of the host. |
Realm | Libvirt | Name of the realm. |
State | Enabled | Current state of the host. |
Connected | "" or "" | Whether or not the host is connected to the realm. |
URI | urn:oasis:names:specification:docbook:dtd:xml:4.1.2 | The host's uniform resource identifier. |
Hardware Profile | timonster | The name of the hardware profile associated with the host. |
Hardware Profiles
Filter | Example | Description |
---|---|---|
Name | timonster | Name of the hardware profile. |
Realm | Libvirt | Name of the realm. |
Devices | 1 X gpu-nonexistent, 1 X gpu-nvidia | Name and quantity of hardware devices. |
Libvirt Storage Pools
Filter | Example | Description |
---|---|---|
Name | timonster | Name of the storage pool. |
Realm | Libvirt | Name of the realm. |
Type | Drives | Name of the hardware device. |
Location | storage/libvirt-ticrypt-pools | Location of the storage pool on the server. |
Additional Notes
Type
of storage pools may be the following:Drives
Bricks
Volumes
Images
IOSs
Other
Libvirt Volumes
Filter | Example | Description |
---|---|---|
Realm | Libvirt | Name of the realm. |
Pool | ticrypt-bricks | Name of the associated storage pool. |
Volume | storage/libvirt-ticrypt-pools | Location of the storage pool on the server. |
VM Images
Filter | Example | Description |
---|---|---|
Name | Libvirt Production | Name of the VM Image. |
Parent | vm-image:8712301230 | Name of the parent VM Image. |
Type | Linux | Operating system type. |
Info | storage/libvirt-ticrypt-pools | Location of the VM image on the server. |
VM Hardware Setups
Filter | Example | Description |
---|---|---|
Name | Libvirt Production | Name of the VM Hardware setup. |
Debug | "" | Whether or not debugging is enabled. |
Realm | Libvirt | Type of the realm. |
Image | Ubuntu001 | Name of the VM image. |
Operating System (Os) | Windows | Name of the operating system. |
Device | gpu-nonexistent3 | Name and quantity of current devices. |
Created by | John Smith | Name of the VM Hardware creator. |
VM Configurations
Filter | Example | Description |
---|---|---|
Name | Linux VM | Name of the VM configuration. |
State | Running | The current state of the VM configuration. |
Owner(s) | Jack Doe | Owner name of the VM configuration. |
VM Setup | WinServer | Name of the VM setup for this configuration. |
Project | Research A123 | Name of the project that tags the VM configuration. |
Team | Senior Researchers | Name of the team operating the VM configuration. |
Virtual Machine | CentOS1234 | Name of the virtual machine. |
Fixed MAC | 00:1b:63:84:45:e6 | Address of the MAC device. |
Additional Notes
State
can have multiple forms as follows:Stopped
: The VM has been stopped by its owner.Starting
: The VM is in the process of starting.Running
: The VM is currently running normally.Suspended
: Its users have manually suspended the VM.Stopping
: The VM is in the process of stopping.
Virtual Machine
indicates the real name of the VM. Each VM Configuration is similar to a virtual "arrangement." which allows access to the real virtual machine.
Running VMs
Filter | Example | Description |
---|---|---|
Name | Linux VM | Name of the running VM configuration. |
Owner | Jack Doe | Owner name of the running VM configuration. |
Project | Research A123 | Name of the project that tags the running VM configuration. |
Team | Senior Researchers | Name of the team operating the running VM configuration. |
Debug | "" | Whether or not debugging is enabled. |
Conn | "" or "" | Whether or not the running VM is connected. |
VM Hardware Setup | CentOS-123 | Name of the VM Hardware Setup of the running VM configuration. |
VM ID | 130iiuy-9281-40ojh-m7y2 | Name of the VM identification number. |
Host Server | ticrypt | Name of the hosting server. |
IP Adress | 192.158.1.38. | Name of the IP address where the running VM is registered. |
MAC Address | 00:1b:63:84:45:e6 | Address of the MAC device. |
Past VMs
Filter | Example | Description |
---|---|---|
Name | Windows VM | Name of the past VM configuration. |
Owner | Joe Doe | Owner name of the past VM configuration. |
Team | Junior Researchers | Name of the team operating the past VM configuration. |
Debug | "" | Whether or not the debugging is enabled. |
VM Hardware Setup | CentOS-123 | Name of the VM Hardware Setup of the past VM configuration. |
Host Server | ticrypt | Name of the host server. |
IP Adress | 192.158.1.38. | Name of the IP address where the past VM was registered. |
MAC Address | 00:1b:63:84:45:e6 | Address of the MAC device. |
Service VMs
Filter | Example | Description |
---|---|---|
Name | Windows VM | Name of the service VM configuration. |
Owner | Joe Doe | Owner name of the service VM configuration. |
Active | "" | Whether or not the service VM configuration is active. |
Image | Ubuntu123 | Name of the VM Image for the service VM configuration. |
Host Server | ticrypt | Name of the host server. |
IP Adress | 192.158.1.38. | Name of the IP address where the service VM is registered. |
MAC Address | 00:1b:63:84:45:e6 | Address of the MAC device. |
Drives
Filter | Example | Description |
---|---|---|
Name | Office Drive | Name of the drive. |
Owner | Joe Smith | Owner name of the drive. |
Project | Research A123 | Name of the project that tags the drive. |
Team | Desk Researchers | Name of the team operating the drive. |
ID | 145erpl-23vssd-9123s-mn1091 | Drive Identification number. |
Format | ext4 | Format type of the drive. |
Type | raw | The type of storage for the drive. |
Pool | ticrypt-drives | The storage pool where the drive lives. |
Additional Notes
Type
of the drive may be as follows:raw
: The drive defaults at this state. The storage behaves like an external hard drive or thumb drive.qcow2
: The drive is copy-on-write. The physical storage layer is separated from the virtual storage layer.
ISO Images
Filter | Example | Description |
---|---|---|
Name | Rocky8 Production | Name of the ISO image. |
Realm | Libvirt | Name of the realm of the ISO image. |
Owner | Gabrielle Johnson | Owner name of the ISO image. |
File | 9123nkas94qjdrlwkty78n12k4po1012 | Name of the ISO file. |
Bootable | "" or "" | Whether or not the ISO image is bootable. |
Service | "" or "" | Whether or not the ISO image is in service. |
Licensing Servers
Filter | Example | Description |
---|---|---|
Server | google.com | Name of the licensing server. |
Ports | 8080,1234 | The ports of the licensing server. |
Protocol | tcp | Type of server protocol. |
Active | "" or "" | Whether or not the licensing server is active. |
Group | Front-end Engineers | Name of the group responsible for the licensing server. |
Created by | Emily Smith | Creator name of the licensing server. |
Additional Notes
Protocol
may be as follows:
TCP
: Transmission Control Protocol.UDP
: User Datagram Protocol. You may select one of the two currently existing protocols.
Escrow Section
Escrow Users
Filter | Example | Description |
---|---|---|
User | Alin Dobra | Name of the escrow user. |
Email | alin.dobra@terainsights.com | Escrow user's email. |
Groups | CEO | The escrow group of the escrow user. |
Status | Active | The current escrow user status. |
Department | IT | The department of the escrow user profile. |
Position | Chief | The position of the escrow user profile. |
Additional Notes
Status
of the escrow users may be the following:
Active
: The escrow user is active and working usually.Inactive
: The escrow user is inactive and no longer has escrow responsibility.Locked
: The escrow user has been locked for security reasons.
Escrow Certificates
Filter | Example | Description |
---|---|---|
Type | old-escrow-group | Name of the escrow grup. |
Signed by | Alin Dobra | The full name of the escrow certificate signee. |
Additional Notes
The type
of the escrow certifications may be the following:
new-escrow-public-key
new-escrow-group
list-escrow-groups
get-escrow-group-by-id
add-key-to-escrow-group
list-escrowed-keys-for-user
get-escrowed-key-by-id
get-users-with-escrowed-keys
get-recovery-key-set
get-recovery-key-sets-for-escrow
retrieve-recovery-key
add-recovery-key
add-escrow-user
get-escrow-user-by-id
list-all-escrow-users
get-own-escrow-user
get-escrow-public-key-by-id
get-escrow-public-keys-for-user
create-inbox
delete-escrow-user
Miscellaneous Section
System Services
Filter | Example | Description |
---|---|---|
Name | Access Service | Name of the system service. |
Service | ticrypt-service | Backend name of the service. |
Running | "" or "" | Whether or not the service is running. |
Description | Responsible for service of all system. | The description of the service. |
Audit Logs
Filter | Example | Description |
---|---|---|
Type | VR01 | Type of the audit log. |
Arg 1 | true | Argument 1. |
Arg 2 | false | Argument 2. |
Arg 3 | 1234 | Argument 3. |
... | ... | ... |
Arg 20 | true | Argument 20. |
System Settings
The section has a search bar in the top right allowing keyword searches.