How do I set up a project with exclusive access for researchers?
Example:
Imagine the following scenario.
Your research group applies for a grant from a governmental entity. One of the conditions for carrying out the project is that nobody (including system admins) can have access to the resources except the researchers.
To address this condition tiCrypt can restrict access per file, project, team and user both cryptographically and access-controlled.
To restrict access only to researchers, you have several workflows.
1. Dedicated Virtual Machines
- The group of researchers will select a leader (PI) among them who will be responsible for the project.
- The leader will carry out the following actions:
- Now, the research group and the PI are the only ones with access to view and work with the project resources.
info
- Groups are different from teams. A group of researchers may come from several distinct teams.
- The role of the system admin will be to manage the team quotas for the research group.
2. Classify Files by Tagged Groups
- The group of researchers will select a leader (PI) among them who will be responsible for the project.
- The leader will carry out the following actions:
- Create a new project.
- Add all members of the research group to the project.
- Create a new group.
- Add all research group members to the new group.
- Tag the group with the project.
- Use the group directory to collect research data and carry out the project.
- Additionally, the leader of the project can use a separate directory for the research:
- Create a new directory.
- Tag the directory with the project.
- Share the directory with the group members.
- Use the directory to collect research data and carry out the project.
- Now, the research group and the PI are the only ones with access to view and work with the project resources.
tip
If a project is highly sensitive, we always recommend using dedicated project-tagged Virtual Machines.
note
In principle, tiCrypt understands that no two projects are ever identical.