Access Management > Security

Use this topic to enable and configure security policies efficiently and promptly within Core Manager. This page is only visible when Access Control is turned On.

Note: Only Administrators have access to this page, the lower Roles do not. Refer to the Access Management > Roles topic to learn more.

Sign In

Two robust policies fortify your protection. You can choose between Delay between attempts, or Number of failed attempts before lock, the latter of which empowers you to enforce a Lock profile after the last attempt for for a defined duration.

Password Requirements

Password requirements are rules and criteria that dictate how passwords must be structured and created to enhance security. These requirements often include factors such as password length and complexity (combining letters, numbers, and symbols). They serve to protect accounts and sensitive information by making it more challenging for unauthorized individuals to guess or crack passwords.

The default characters requirement is set to 8, but can be adjusted to demand up to 100 characters. The following criteria can be implemented: 

Additionally, there are options to prohibit the reuse of the last 4 passwords and for added security.

File Upload Permissions

The security policies implemented enable the restriction of specific file formats when uploading to the Core. These measures are designed to enhance data security by allowing only authorized and safe file types, mitigating potential security risks and data vulnerabilities. There is the option to select Allow All file types or specify the desired file types.

The available file formats are categorized into four sections: Files, Audio, Video, and Images, which are listed as follows:

Files

Audio

Video

Images

PDF

MP3

MP4

JPEG1

DOCX

WAV

AVI

PNG

XLSX

FLAC

MKV

GIF

PPTX

AAC

MOV

BMP

ODT

OGG

MPEG

SVG

ODS

AIFF

3GP

WebP

ODP

 

 

RAW

TXT

 

 

 

JSON

 

 

 

EDID1

 

 

 

1. Allowed to upload in the Files, Cameras, and Video Endpoints features.

Reset to Default

Every Security section has a Reset to Default option which allows users to restore a setting or configuration to its original, factory-defined state. When this button is clicked or activated, it will undo any changes or customizations that have been made to the setting, reverting it to the standard default configuration.