Skip to main content

How do I use the system services effectively?

Premeditation

It will help if you view the logs of system services because they serve the auditing and system administration purposes.

There are in total 11 independent services, fully isolated from each other:

  • tiCrypt-auth: authentication and system security overall.
  • tiCrypt-proxy: proxying application access to secure VMs.
  • tiCrypt-file-manager: vault file management.
  • tiCrypt-logger: logging activity (tiAudit).
  • tiCrypt-maintenance: maintenance tasks (cleaning and deactivations).
  • tiCrypt-notifications: managing/distributing notifications.
  • tiCrypt-rest: communications with external ecosystem.
  • tiCrypt-stats: system statistics.
  • tiCrypt-storage: management of the Vault file storage.
  • tiCrypt-vm: management of Virtual machines.

Principle

The conduct behind the system services is having a complete separation of powers between the tiCrypt users, admins, front-end, and back-end, resulting in a highly secured decentralized system. Much like blockchain.

The system services allow you to independently analyze events and actions in isolated parts.

In other words, tiCrypt has 11 solutions isolated from each other, yet working together to achieve high security and compliance.

Practice

To view the story of what happened in the system services, navigate to the tab in the System Services section.

  • Select a system service you want to view the logs of.
  • Click the View Logs button in the top right.
  • Follow the instructions from the view system service logs section.
tip

To learn how to configure services using the tiCrypt commands, navigate to configuring services section.