Skip to main content

System Services

How do I Use the System Services Effectively?

System services logs support system auditing and administration.

There are a total of 11 independent services, each fully isolated from the others.

  • tiCrypt-auth: authentication and overall system security.
  • tiCrypt-proxy: proxying application access to secure VMs.
  • tiCrypt-file-manager: Vault file management.
  • tiCrypt-logger: logging activity (tiAudit).
  • tiCrypt-maintenance: maintenance tasks (cleaning and deactivation).
  • tiCrypt-notifications: managing and distributing notifications.
  • tiCrypt-rest: communication with external ecosystems.
  • tiCrypt-stats: system statistics.
  • tiCrypt-storage: management of Vault file storage.
  • tiCrypt-vm: management of virtual machines.

The principle behind the system services is a complete separation of powers between tiCrypt users, admins, front-end, and back-end, resulting in a highly secure, decentralized system. Much like a blockchain.

The system services allow you to independently analyze events and actions in isolated components.

In other words, tiCrypt has 11 isolated services that work together to achieve high security and compliance.

tip

Follow the instructions in View System Service Logs. For backend service configuration, follow the instructions in Configuring services.