Skip to main content

Filters

Global Filters

Each section in the Management tab allows data filtering.

Select all

Selects all the visible entries of the section.

Remove all filters from current table

Cleans all filtering of the section in the management tab.

Remove all column order customization

Removes all column and panel edits globally, turning all changes back to default.

e.g. adjusting panel widths, sorting tables, resizing columns, hidden columns, and multi-sorting.

Clicks per columnAction
OnceSort column ascending.
TwiceSort column descending.
Three timesRemove filter.

The following filters are applied per section.

Users

FilterExampleDescription
Login IDjohn.smith@terainsights.comUnique user ID.
First nameJohnUser's first name.
Last nameSmithUser's last name.
ProfileCustom (32 perms)User profile name or custom permission amount.
RoleSub-adminUser role in the system.
StatusNew,not activatedUser account activation state.
Deactivation CauseRegistrationThe cause of user deactivation.
Teams4 teamsTotal number of the user's teams.
Deactivation ReasonFailedPasswordReason for which the account is inactive.
Contact emailjohn.smith@gmail.comUser's personal or business email.
IDc7150a1b-1f4d-4uf8-bdtd-391425a69arfThe unique user ID.
JoinedMay 12, 2024The date user registered in the system.
Last LoginMarch 29, 2025The date when user last logged in the system.
TOS AcceptedMay 20, 2024The date user accepted the terms of service.
Password ChangedJanuary 6, 2025The date user changed their password.
Can Escrow"" or ""Whether or not the user can escrow.
Last EscrowSeptember 27, 2024The date when user had their key escrowed.
ExpiresDecember 30, 2029The expiration date of the escrow.
note
  • Profile is a custom field with either:

    • Custom n perm: a manual number of permissions with an unnamed user profile.
    • [Your given profile name]: a manually given profile name with a manually given number of permissions.
  • Status depends on the escrowing abilities:

    • Deactivated: The user can no longer log in.
    • Escrow upon login: The user allows private key escrowing on the next login.
    • New, escrow upon login: The user will log in for the first time, allowing private key escrowing.
  • Deactivation Cause may come from the following:

    • Admin: if the admin deactivated the user manually.
    • Failed password: if the user fails to enter the correct password multiple times.
    • Timeout: if the user has not logged in for an extended period.
    • XSS: technical issues.
    • Registration: The account is new and not yet activated.
  • Deactivation Reason is custom and can be typed by an admin.

Deleted Users

FilterExampleDescription
Emailjoe.doe@terainsights.comUnique user ID.
First nameJoeDeleted user's first name.
Last nameDoeDeleted user's last name.
DeletedOct 23, 2022The date the user has been deleted.
Deleted bySteven AdminThe full name of admin who performed the deletion.

Sub-admin Managed Objects

FilterExampleDescription
ManagerGabrielle JohnsonFull sub-admin name.
ObjectResearch A123Full name of the object.
TypeprojectWhether the object is a project or a team.

User Profiles

FilterExampleDescription
NameEngineering ManagerFull name of the user profile.
RoleAdminRole of the user profile in the system.
Session Downgrade"" or ""Whether or not the user profile had a role downgrade.

Onboarding

FilterExampleDescription
NameNew Users OnboardName of the onboarding template.
UserJohn SmithUser who owns the template.
ProfileUserFull name of the user.
StatusActiveFull name of the user.
note
  • Status is a fixed field:
    • Active: the onboard template is active and working.
    • Deactivated: the onboard template is inactive and does not apply to any user.
    • Escrow upon login: the onboard template applies only to added users with escrow upon login.
    • No state change: the onboard template is new with no change of state.

Resources by User

FilterExampleDescription
UserBrian DollyFull name of the user.

Groups

FilterExampleDescription
GroupBrian DollyFull Group name.
OwnerBrian DollyFull name of the group owner.
ProjectResearch 001Name of the project tagging the group.

Teams

FilterExampleDescription
NameJunior ResearchersFull name of the team.
Risk assessment ID10323341Serves the teams tagging purpose.
note
  • Risk assessment ID is a tagging custom field including:
    • Characters.
    • Letters.
    • Numbers.

Team Memberships

FilterExampleDescription
TeamSenior ResearchersFull name of the team.
UserBrian DollyFull name of the user belonging to the team.

Security Requirements

FilterExampleDescription
RequirementDrivers LicenseName of the security requirement.
TypeUserCertType of requirement.
LevelsValid US PermitName of the security levels associated with the requirement.
note

Type of requirement is linked to User certifications by default. This can be customized based on your organization's needs.

Security Levels

FilterExampleDescription
NameHIPAAName of the security level.
RequirementsCertified ResearcherType of requirement.

Projects

FilterExampleDescription
NameResearch A123Name of the project.
PIBilly WilliamsFull name of the Personal Investigator.
LevelHIPAAName of the security level optionally tagging the project.
ParentResearch AName of the parent project if present.
note

You can add additional custom fields from Custom Fields.

Project Memberships

FilterExampleDescription
ProjectResearch A123Name of the project.
UserBilly WilliamsFull name of the Personal Investigator.
Manager"" or ""Whether or not the user is a manager of the project.
RestrictionsDownloadWhether the user can view or download the project contents.
note
  • Restrictions is a fixed field:
    • Download: member cannot download project resources.
    • View or Download: member cannot view or download project resources.

User Certifications

FilterExampleDescription
RequirementDriver LicenseName of the security requirement.
UserJohn SmithFull name of the certified user.
Modified byGabrielle JohnsonThe manager's full Name who made the last edit.
note

Modified by: implies sub-admin's responsibility for editing the user certificates. This usually falls on either the PI or the project manager, and it is fully audited at all times.

Resources by Project

FilterExampleDescription
ProjectResearch A123Name of the project associated with the displayed resources.

Realms

FilterExampleDescription
NameLibvirt RealmName of the realm.
DriverLibvirtDriver software of the realm.

Libvirt Hosts

FilterExampleDescription
NametiedgeName of the host.
RealmLibvirtName of the realm.
StateEnabledCurrent state of the host.
Connected"" or ""Whether or not the host is connected to the realm.
Exclusive MACs"" or ""Whether or not the host uses exclusive MACs.
URIurn:oasis:names:specification:docbook:dtd:xml:4.1.2The host's uniform resource identifier.
Hardware ProfiletimonsterThe name of the hardware profile associated with the host.

Hardware Profiles

FilterExampleDescription
NametimonsterName of the hardware profile.
RealmLibvirtName of the realm.
Devices1 X gpu-nonexistent, 1 X gpu-nvidiaName and quantity of hardware devices.

Libvirt Storage Pools

FilterExampleDescription
NametimonsterName of the storage pool.
RealmLibvirtName of the realm.
TypeDrivesName of the hardware device.
Default"" or ""Whether or not the storage pool is set to default.
Locationstorage/libvirt-ticrypt-poolsLocation of the storage pool on the server.
ID39da3a11-2124-4d2f-anf7-06bdrb8c14e2The backend ID of the storage pool used for debugging.
note

Type of storage pools may be the following:

  • Drives
  • Bricks
  • Volumes
  • Images
  • IOSs
  • Other

Libvirt Volumes

FilterExampleDescription
RealmLibvirtName of the realm.
Poolticrypt-bricksName of the associated storage pool.
Volumestorage/libvirt-ticrypt-poolsLocation of the storage pool on the server.

VM Images

FilterExampleDescription
NameLibvirt ProductionName of the VM Image.
Parentvm-image:8712301230Name of the parent VM Image.
TypeLinuxOperating system type.
Bus typevirtioThe bus type of the VM Image.
Secure Boot"" or ""Whether or not the VM image is boot secured.
Infostorage/libvirt-ticrypt-poolsLocation of the VM image on the server.
note

The type is a fixed field:

  • SCSI
  • VIRTIO
  • Unknown

VM Hardware Setups

FilterExampleDescription
NameLibvirt ProductionName of the VM Hardware setup.
Debug""Whether or not debugging is enabled.
Advanced OptionsDisabledActivation of advanced options for specific setups.
VM SettingsEnabledActivation of advanced VM settings for debug purposes.
RealmLibvirtType of the realm.
VariantDefaultVariant tag of the Hardware Setup.
ImageUbuntu001Name of the VM image.
Operating System (OS)WindowsName of the operating system.
Devicegpu-nonexistent3Name and quantity of current devices.
Created byJohn SmithName of the VM Hardware creator.

VM Configurations

FilterExampleDescription
NameLinux VMName of the VM configuration.
StateRunningThe current state of the VM configuration.
Owner(s)Jack DoeOwner name of the VM configuration.
VM SetupWinServerName of the VM setup for this configuration.
ProjectResearch A123Name of the project that tags the VM configuration.
TeamSenior ResearchersName of the team operating the VM configuration.
Virtual MachineCentOS1234Name of the virtual machine.
RW Drives1Number of read-write drives.
RO Drives0Number of read-only drives.
Fixed MAC00:1b:63:84:45:e6Address of the MAC device.
note
  • State can have multiple forms as follows:
    • Stopped: The VM has been stopped by its owner.
    • Starting: The VM is in the process of starting.
    • Running: The VM is currently running normally.
    • Suspended: Its users have manually suspended the VM.
    • Stopping: The VM is in the process of stopping.
  • Virtual Machine indicates the real name of the VM. Each VM Configuration is similar to a virtual gateway which allows access to the real virtual machine.

Running VMs

FilterExampleDescription
NameLinux VMName of the running VM configuration.
OwnerJack DoeOwner name of the running VM configuration.
ProjectResearch A123Name of the project that tags the running VM configuration.
TeamSenior ResearchersName of the team operating the running VM configuration.
Debug""Whether or not debugging is enabled.
Conn"" or ""Whether or not the running VM is connected.
VM Hardware SetupCentOS-123Name of the VM Hardware Setup of the running VM configuration.
VM ID130iiuy-9281-40ojh-m7y2Name of the VM identification number.
Host ServerticryptName of the hosting server.
IP Adress192.158.1.38.Name of the IP address where the running VM is registered.
MAC Address00:1b:63:84:45:e6Address of the MAC device.

Past VMs

FilterExampleDescription
NameWindows VMName of the past VM configuration.
OwnerJoe DoeOwner name of the past VM configuration.
ProjectResearch A123Name of the project that tagged the past VM configuration.
TeamJunior ResearchersName of the team operating the past VM configuration.
Debug""Whether or not the debugging is enabled.
VM Hardware SetupCentOS-123Name of the VM Hardware Setup of the past VM configuration.
Host ServerticryptName of the host server.
IP Adress192.158.1.38.Name of the IP address where the past VM was registered.
MAC Address00:1b:63:84:45:e6Address of the MAC device.
ID521f9416-5b80-4622-a2b1-58et21fdk768The ID of the past VM.

Service VMs

FilterExampleDescription
NameWindows VMName of the service VM configuration.
OwnerJoe DoeOwner name of the service VM configuration.
Active""Whether or not the service VM configuration is active.
ImageUbuntu123Name of the VM Image for the service VM configuration.
Host ServerticryptName of the host server.
MAC Address00:1b:63:84:45:e6Address of the MAC device.

Drives

FilterExampleDescription
NameOffice DriveName of the drive.
OwnerJoe SmithOwner name of the drive.
ProjectResearch A123Name of the project that tags the drive.
TeamDesk ResearchersName of the team operating the drive.
StateReadyState of the drive.
Shares3Number of user keys the drive was shared with.
ID145erpl-23vssd-9123s-mn1091Drive Identification number.
Formatext4Format type of the drive.
TyperawThe type of storage for the drive.
Poolticrypt-drivesThe storage pool where the drive lives.
note
  • Type of the drive may be as follows:
    • raw: The drive defaults at this state. The storage behaves like an external hard drive or thumb drive.
    • qcow2: The drive is copy-on-write. The physical storage layer is separated from the virtual storage layer.

Devices

FilterExampleDescription
NameGPU-01Name of the device.
IDgpu-nvidiaDevice identifier.
TagsGPUName of the device tag.

NFS Mounts

FilterExampleDescription
NameNFS DriveName of the NFS mount.
Export Pathnfs/export/testNFS mount export path.

ISO Images

FilterExampleDescription
NameRocky8 ProductionName of the ISO image.
RealmLibvirtName of the realm of the ISO image.
OwnerGabrielle JohnsonOwner name of the ISO image.
File9123nkas94qjdrlwkty78n12k4po1012Name of the ISO file.
Bootable"" or ""Whether or not the ISO image is bootable.
Service"" or ""Whether or not the ISO image is in service.

Licensing Servers

FilterExampleDescription
Servergoogle.comName of the licensing server.
Ports8080,1234The ports of the licensing server.
ProtocoltcpType of server protocol.
Active"" or ""Whether or not the licensing server is active.
GroupFront-end EngineersName of the group responsible for the licensing server.
Created byEmily SmithCreator name of the licensing server.
note

Protocol may be as follows:

  • TCP: Transmission Control Protocol.
  • UDP: User Datagram Protocol. You may select one of the two currently existing protocols.

Escrow Users

FilterExampleDescription
Emailjohn.smith@terainsights.comEscrow user's email.
UserJohn SmithName of the escrow user.
GroupsEscrow-1The escrow group of the escrow user.
StatusActiveThe current escrow user status.
DepartmentITThe department of the escrow user profile.
PositionChiefThe position of the escrow user profile.
note

Status of the escrow users may be the following:

  • Active: The escrow user is active and working.
  • Inactive: The escrow user is inactive and no longer has escrow responsibility.
  • Locked: The escrow user has been locked for security reasons.

Escrow Certificates

FilterExampleDescription
TypeEscrow-2Name of the escrow grup.
Signed byJohn SmithThe full name of the escrow certificate signee.
note

The type of the escrow certifications may be the following:

  • new-escrow-public-key
  • new-escrow-group
  • list-escrow-groups
  • get-escrow-group-by-id
  • add-key-to-escrow-group
  • list-escrowed-keys-for-user
  • get-escrowed-key-by-id
  • get-users-with-escrowed-keys
  • get-recovery-key-set
  • get-recovery-key-sets-for-escrow
  • retrieve-recovery-key
  • add-recovery-key
  • add-escrow-user
  • get-escrow-user-by-id
  • list-all-escrow-users
  • get-own-escrow-user
  • get-escrow-public-key-by-id
  • get-escrow-public-keys-for-user
  • create-inbox
  • delete-escrow-user

System Services

FilterExampleDescription
NameAccess ServiceName of the system service.
Serviceticrypt-serviceBackend name of the service.
Running"" or ""Whether or not the service is running.
DescriptionResponsible for service of all system.The description of the service.

Audit Logs

FilterExampleDescription
TypeVR01Type of the audit log.
Arg 1trueArgument 1.
Arg 2falseArgument 2.
Arg 31234Argument 3.
.........
Arg 20trueArgument 20.

API Keys

FilterExampleDescription
Token TypeVMType of token.
OwnerJohn SmithFull name of the token owner.
note

The Token Type field can be the following:

  • Team
  • VM
  • Project

System Settings

This section has a search bar in the top right allowing keyword searches.

Custom Fields

This section does not require a search or filter.

Option Pinning

You can pin options in the top right panel everywhere in tiCrypt. This allows the system to memorize your favorite actions.

To pin an option:

  1. Select the element.
  2. Click the Open Full Menu three-dot button in the top right panel.
  3. Click Pin next to the option you want to pin.
  4. View the option pinned at the top.

To unpin an option:

  1. Select the element.
  2. Click the Open Full Menu three-dot button in the top right panel.
  3. Click Unpin next to the option you want to unpin.
  4. View the unpinned option back in the menu.

When you pin an option you view it in the top right panel at all times. When you unpin the option, it goes back into the Open Full Menu. Pinning system applies per sub-section for all elements.

note

Pinned or unpinned options remain this way until you change them.