02. Security

Last modified by Tom Jardine on 06/11/2025, 14:23

There are a comprehensive range of security protocols and options available to maintain control over users and data access across the solution.

Authentication

A number of authentication settings, designed to control secure access across a network, are fully configurable.

User Management

Comprehensive User Management features are available to administrators. Once an account has been created, the user will be placed in a default user group previously configured to have a default set of access rights. Users can then be moved between groups depending on their role and job function. Users can exist in multiple user groups and each group can be assigned different access rights to specific Indexes, Search Engines, application features and reports.

Realm-Based Security

There are a number of ways in which access to data can be restricted across the solution, however the most granular security method is the use of Realm-Based Security.

Realms define exactly the data a user has permission to and are allocated to user groups. Any other documents are not visible are not included in search results, drop-down lists, counts or calculations.

Password Policies

A number of options are available to configure the system-wide password strengths with the Password Policies settings. 

Lockdown

If granting users access to administrator screens, it may be necessary to restrict access to certain administration tasks. This is possible using the Lockdown settings.

PGP Key Integration

The integration of Pretty Good Privacy (PGP) Keys facilitates the encryption and decryption of exported reports.

Security Certificates

The Install Certificate screen allows multiple security certificates to be installed for different areas of the solution.