How can I use CRIMSy?
CRIMSy requires some IT background for installation and maintenance and,
in distributed deployments, administrative policies. You therefore should
get support by the IT personel of your institution and, in case you plan
to be part of a distributed infrastructure, administrative support.
Once CRIMSy is installed in your institution, you simply need to point
your web browser to the respective server address.
What does it cost?
CRIMSy is open source, you can use it free of charge. Of course you will
need a server to run it, but the initial hardware requirements are
moderate (2 CPU cores, 2 GiByte RAM, approx. 20 GByte disk). For test
installations, a virtual machine on your desktop computer would be
sufficient.
I have found a bug. / I'd like to suggest a feature.
We would be glad to hear from you. You could approach us on
GitHub or simply
drop us a mail: info@crimsy.org.
Please understand that our resources are limited.
Is there any user documentation?
In general, we are aiming at intuitive usability. This should minimize
the need for additional documentation. We are currently working to
prepare a user handbook covering the most important concepts and
use cases.
I want to share data with partners.
Given your partners have access to the same CRIMSy cloud, sharing access
is a matter of rights management. It requires only a few clicks to
assign or revoke permissions to a specific object to internal or external
users or groups.
Is my data safe?
We have implemented several measures to make CRIMSy safe. Ideally, these
measures should be complemented by backup and firewalling strategies of
the hosting institution. Permanent storage of your data is restricted to
your local instance. Our general policy denies any data modification
by users from external partner institutions. Many records come with version
control, i.e. any modification can be traced and reverted.
I have been asked to setup CRIMSy. How shall I proceed?
There are two scenarios:
What are the requirements to run a CRIMSy node?
CRIMSy has moderate hardware requirements. You could start with two CPU cores,
2 Gigabytes of RAM, a 20 Gigabytes hard disk and a 10 MBit network connection.
Is CRIMSy secure?
We have put much effort in making CRIMSy secure. We make ample use of encryption,
the need-to-know-principle and digital signatures. The source code of CRIMSy
has been subject to automated code reviews to discover weaknesses. Individual
components of our software stack are isolated by containerization. We have documented
the architecture including a risk assessment in our
System architecture handbook (German only).
How can I contribute to the development?
CRIMSy is developed on GitHub (https://github.com/ipb-halle/CRIMSy).
We suggest to get in contact with us: info@crimsy.org.
How can I setup a test instance?
The setup of a test instance and the prerequisites are described in a wiki
article on GitHub: https://github.com/ipb-halle/CRIMSy/wiki/Test-setup.
GnuPG public keys
Some of our libraries are signed to guard against tampering. You can use the following public key for signature verification or trusted communication:
CA Certificate
We maintain a private CA for cloud internal purposes. You can download the CA certificate here:
Copyright © 2023 Leibniz Institute of Plant Biochemistry - All rights reserved