Skip to main content

API Keys

What are the API Keys?

API keys are credentials that authorize the back-end to provide specific information, enabling users to manage tiCrypt and integrate it with other systems.

They allow secure communication between tiCrypt and external platforms, such as accounting systems that track user payments or actions.

note

API key operations are strictly controlled for security reasons.

What Kind of Software Integrates with tiCrypt?

The following software has been successfully integrated into tiCrypt-secured VMs:

  • 7-zip
  • Adobe Acrobat
  • Abaqus
  • ANSYS
  • ArcGIS
  • BRB-ArrayTools
  • BRB-CGHTools
  • Cytoscape
  • Esri Business Analyst
  • Git
  • IIS
  • Java
  • LabVIEW
  • MATLAB
  • Microsoft Office
  • Microsoft SQL Server
  • Microsoft Visual C++
  • Microsoft Visual Studio
  • Perl (programming language)
  • PostgreSQL (programming language)
  • Python
  • R
  • RStudio
  • SAS
  • SolidWorks

In addition, tiCrypt can integrate with STATA, open-source software, Julia, C++, and many others.

  • Complex system integrations are discussed with the tiCrypt Development team.
  • The tiCrypt Development team anticipates what you can achieve with certain systems and may assist you in your decisions.
note

tiCrypt does not compromise security for integration. If you want to integrate software with tiCrypt, collaboration is needed to identify potential risks beforehand.

What If I have a Special Software Request that is Not Compatible with tiCrypt?

The tiCrypt Development team goes the extra mile to help you figure out complex hardware integrations.

You can contact Tera Insights for technical assistance with hardware integration.

Scenario

We received a special request from users who utilized software that worked with their significant VRM (voltage regulator module) infrastructure. However, the software did not function in a virtual machine environment.

As a result, we contacted the software vendor to ask if they could run their software on a virtual machine.
They were not able to adapt the software for a virtual machine environment; therefore, our tiCrypt Development team decided to develop a custom solution to fit the user's needs.

We successfully integrated the special software into the virtual machines, allowing users to continue their research with the tools they were most comfortable with.