How do I use the system services effectively?
Premeditation
It will help if you view the logs of system services because they serve the auditing and system administration purposes.
There are in total 11 independent services
, fully isolated from each other:
- tiCrypt-auth: authentication and system security overall.
- tiCrypt-proxy: proxying application access to secure VMs.
- tiCrypt-file-manager: vault file management.
- tiCrypt-logger: logging activity (tiAudit).
- tiCrypt-maintenance: maintenance tasks (cleaning and deactivations).
- tiCrypt-notifications: managing/distributing notifications.
- tiCrypt-rest: communications with external ecosystem.
- tiCrypt-stats: system statistics.
- tiCrypt-storage: management of the Vault file storage.
- tiCrypt-vm: management of Virtual machines.
Principle
The conduct behind the system services is having a complete separation of powers between the tiCrypt users, admins, front-end, and back-end, resulting in a highly secured decentralized system. Much like blockchain.
The system services allow you to independently analyze events and actions in isolated parts.
In other words, tiCrypt has 11 solutions
isolated from each other, yet working together to achieve high security and compliance.
Practice
To view the story of what happened in the system services, navigate to the tab in the System Services
section.
- Select a system service you want to view the logs of.
- Click the
View Logs
button in the top right. - Follow the instructions from the view system service logs section.
To learn how to configure services using the tiCrypt commands, navigate to configuring services section.