Skip to main content

Lincensing Servers

What are the Licensing Servers?

The Licensing Servers let you add IP addresses that virtual machines can connect to. These servers create an allowlist accessible to all VMs during runtime, often used to contact licensing servers for software.

What are the Property Groups in Licensing Servers?

Property Groups are generic metadata that allow you to group related licensing servers.

tiCrypt allows you to run with multiple server backends. tiCrypt can simultaneously manage a pool of servers in different geographical areas. Additionally, you can accommodate a surge of servers to host a short-term project at the highest computational speed.

For example, if an institution would like to launch an AWS project for 2-3 weeks and then shut down the servers at the end of the project, that can be achieved via tiCrypt server backend management. The institution will save a large amount of financial resources that otherwise would have been spent uncontrollably.

What is the Maximum Number of Servers that I can Accommodate in tiCrypt?

You can easily scale up to 100 servers ($10M value) and reach data center level.

  • tiCrypt is both a VM Management tool and a private cloud solution.
  • tiCrypt always knows where the VMs are located and how to manage them.
note

Virtual machines in tiCrypt do not allow internet connections because it would compromise security.
Additionally, VMs require double permission.

What is the Difference between a Default Open and a Default Shut System?

A default open system protects its territory starting from the outside. For example, using Firewalls, perimeter defense mechanisms, and ACLs is an open system practice.

A default shut system protects its territory starting from the inside. For example, using PKC (public key cryptography) and end-to-end encrypted software is a shut system practice.

note

tiCrypt is a default shut system with capabilities to add hybrid security layers such as firewalls, VPNs, ACLs, and others.

Can I use the Allow List Property Group in Licensing Servers to Allow Access to External Repositories, Packages and Cloud-based Registry Updates?

The secure environment allows users to boot VM images created by the institution within tiCrypt. These images contain the necessary software and applications for research groups, including both proprietary and open-source software. Within the tiCrypt system, an allowlist service manages and restricts communication between licensing servers and VMs. It is recommended that licensing servers be controlled by the institution. This is how institutions activate software such as Windows, Office, ArcGIS, and other applications that require a licensing server.

For security reasons, VMs do not have general internet access and are restricted to communicate only with resources on the allowlist. This approach enables a default shut policy, rather than a default open policy, for VMs. VMs operate like any other Windows or Linux image, supporting containers, databases, singularity, and more.