Security Settings
Overview
The Security Settings screen is used to manage Users, Access Groups, and Logon Policies.
If you have access to multiple client accounts, the pane along the left-hand side of the Security Settings screen lists all of these accounts. If you click on an account, the Security Settings screen is refreshed to show the list of users and Access Groups for this account. If an account has been configured with a Parent / Child architecture, click the arrow icon next to the Parent system to expand it, and view a list of all the Child systems.
On the Security Settings screen, user accounts are split into two categories: System Users and Permitted Users. A System User refers to a user who was initially created within the currently selected client. A Permitted User refers to a user who was initially created within some other client, then was granted access to the currently selected client.
Within the platform, access to the various features and options is managed through the use of Access Groups. Instead of having to manage these permissions individually at the user level, you can define Access Groups, which consist of a set of allowable permissions. You then assign users to one, or more, Access Groups. By default, the platform comes with five Access Groups that are typically sufficient for most needs. These groups can be edited, or new groups can be created, if needed. The five standard Access Groups are:
-
Administrators
-
Content Creators
-
Database Admins
-
Report Viewers
-
Standard Users
The Security Settings screen also includes a section called "Domains." This section lists all of the domains used by the currently selected client, such as the sending domain, form domain, and link domain. These domains are set up in by your Client Services Representative, then displayed on the Security Settings screen for informational purposes.
Access
The Security Settings screen is accessible by selecting "Account Security" from the Profile drop-down menu. .
Features
Click hereClick here
To create a new System User:
-
If you have access
to multiple client accounts, the pane along the left-hand
side of the Security Settings screen lists all of these
accounts. Click on the desired account. The Security Settings
screen is refreshed to show the list of System Users and
Permitted Users for this account. If an account has been
configured with a Parent
/ Child architecture, click the arrow icon next to
the Parent system to expand it, and view a list of all
the Child systems.
-
Above the list of existing
System Users, click new user.
The "Create New User" pop-up window is displayed.
-
Enter the user's personal
information:
-
First
Name: Enter the user's first name.
-
Last
Name: Enter the user's last name.
-
Job
Title: Enter the user's job title.
-
Email
Address: Enter the user's email address.
-
Phone:
Enter the user's phone number.
-
User
Login: Enter the user's login username.
-
If you want the user
account to be active, place a check mark in the "User
Active" check box.
-
To force the user to
enter a new password the first time he or she logs in,
place a check mark in the "Change Password"
check box. In the "Password" field, enter a
temporary, one-use password. Enter this same password
again in the "Confirm Password" field.
-
To
send a "welcome" email to the new user, click
save and send email. Or,
if you're not yet ready to send the "welcome"
email, click save.
-
The
user is added to the “System Users” section. Optionally,
to assign various defaults to the user, click the padlock
icon next to the user’s name. The "Edit User
Access Rights" pop-up window is displayed. This window
allows you to add this new user to one or more Access
Groups.
-
Within the "Defaults"
section, enter the user's default settings:
-
Data
Source: Select the user's default data source.
This option will be selected by default when the user
creates items in the platform, such as Campaigns or
Filters.
-
Folder:
Select the user's default folder location. This option
will be selected by default when the user creates
new foldered items.
-
Within the "Access
Groups" section, place a check mark next to the desired
client account (for a new user, only the currently selected
client account will be available).
-
From the "Add
an Access Group" drop-down menu, select the desired
Access Group.
-
Optionally, to add
the user to additional Access Groups, repeat step 9 as
needed.
-
When finished, click
save access rights.
|
Click hereClick here
To view or edit
a user's information:
-
If you have access
to multiple client accounts, the pane along the left-hand
side of the Security Settings screen lists all of these
accounts. Click on the desired account. The Security Settings
screen is refreshed to show the list of System Users and
Permitted Users for this account. If an account has been
configured with a Parent
/ Child architecture, click the arrow icon next to
the Parent system to expand it, and view a list of all
the Child systems.
-
Click on the desired
user's name. The "Edit User Details" pop-up
window is displayed.
-
Optionally, make any
necessary changes to the user's personal information:
-
First
Name: Change the user's first name.
-
Last
Name: Change the user's last name.
-
Job
Title: Change the user's job title.
-
Email
Address: Change the user's email address.
-
Phone:
Change the user's phone number.
-
User
Login: Change the user's login username.
-
Optionally, to deactivate
the user account, remove the check mark from the "User
Active" check box.
Note: User accounts
can also be activated / deactivated directly from the Security
Settings screen. See "Activate / Deactivate a User"
below for more information.
-
Optionally, to force
the user to enter a new password the next time he or she
logs in, place a check mark in the "Change Password"
check box. This option overrides the password expiration
rules defined for this user.
-
Click save
user.
|
Click hereClick here
From the Security
Settings screen, you can activate or deactivate a user account.
Note: User accounts
can also be activated / deactivated from the "Edit User
Details" pop-up window. See View or Edit User Details
for more information.
To deactivate a
user account:
-
If you have access
to multiple client accounts, the pane along the left-hand
side of the Security Settings screen lists all of these
accounts. Click on the desired account. The Security Settings
screen is refreshed to show the list of System Users and
Permitted Users for this account. If an account has been
configured with a Parent
/ Child architecture, click the arrow icon next to
the Parent system to expand it, and view a list of all
the Child systems.
-
Next to the desired
user's name, click the green check mark icon. A confirmation
dialog box is displayed; click ok.
To activate a user
account:
-
If you have access
to multiple client accounts, the pane along the left-hand
side of the Security Settings screen lists all of these
accounts. Click on the desired account. The Security Settings
screen is refreshed to show the list of System Users and
Permitted Users for this account. If an account has been
configured with a Parent
/ Child architecture, click the arrow icon next to
the Parent system to expand it, and view a list of all
the Child systems.
-
Next to the desired
user's name, click the red exclamation point icon. A confirmation
dialog box is displayed; click ok.
|
Click hereClick here
To view or edit
a user's access rights:
-
If you have access
to multiple client accounts, the pane along the left-hand
side of the Security Settings screen lists all of these
accounts. Click on the desired account. The Security Settings
screen is refreshed to show the list of System Users and
Permitted Users for this account. If an account has been
configured with a Parent
/ Child architecture, click the arrow icon next to
the Parent system to expand it, and view a list of all
the Child systems.
-
Next to the desired
user's name, click the padlock icon. The "Edit User
Access Rights" pop-up window is displayed.
-
Within the "Defaults"
section, optionally modify the user's default settings:
-
Data
Source: Select the user's default data source.
This option will be selected by default when the user
creates items in the platform, such as Campaigns or
Filters.
-
Folder:
Select the user's default folder location. This option
will be selected by default when the user creates
new foldered items.
-
To add the user to
a new client account, place a check mark next to the desired
client account.
-
Optionally, modify
the user's membership in an Access Group:
-
To add the
user to a new Access Group, select the desired group
from the "Add an Access Group" drop-down
menu.
-
To remove the
user from an Access Group, click the remove button
("X" icon) next to the desired group.
-
When finished, click
save access rights.
|
Click hereClick here
The Security Settings
screen allows you to view and edit your own Logon Policies,
which includes password information and other details related
to accessing the Messaging platform.
To view or edit
your logon policies:
-
On the Security Settings
screen, in the "Logon Policy" field, click the
"Edit Current Logon Policies" link. The "Edit
Logon Policies" pop-up window is displayed and populated
with your current logon policies.
Note: If this is
the first time you're viewing your Logon Policies, you may
need to click enable logon policies
to enable this feature.
-
The "Password
Complexity" section allows you to define the rules
regarding your user passwords. Within this section, you
can define the following options:
-
Complexity:
Messaging supports four different character types
from which you can construct a password -- lowercase
letters, uppercase letters, digits, and special characters.
In addition, all passwords must conform to the minimum
length requirement (defined below). From the "Complexity"
drop-down menu, select how many of these character
types are required for a valid password. The options
are "Minimum Length + 3 others" or "Minimum
Length + 4 others."
-
Minimum
Length: In the "Minimum Length" field,
enter the required minimum length for your password.
-
Complexity:
Depending on what you selected from the "Complexity"
drop-down menu above, check exactly three check boxes,
or check all four check boxes.
-
The "Password
Age" section allows you to define the rules regarding
your password expiration. Within this section, you can
define the following options:
-
Minimum
Age: Enter the required minimum number of days
that must pass before you can change your password
again.
-
Maximum
Age: Enter the required maximum number of days
after which the system will force you to change your
password.
-
May
Not Use Last: Optionally, you can be prohibited
from reusing previous passwords. Enter the number
of past passwords that can't be reused.
-
Session
Expiration: Enter the time period (in minutes)
of inactivity before the system will automatically
log you off.
-
Expiration
Warning: Enter the time period (in minutes)
prior to being automatically logged off when the system
will display a session expiration warning. This warning
allows you to extend your session.
-
The "Password Reset Configuration" section allows you to define the rules that control password reset links. When a user needs to reset their password, the platform emails them a link containing a token; the token allows the user to reset their password. The default behavior for this token is to remain valid for a certain period of time (default period is 24 hours), and then deactivate the token once the user changes their password. This behavior allows the user to click the link multiple times within the expiration period. Optionally, check Deactivate token after first click to change this behavior to deactivate the token after the first time the user clicks the link.
-
The "Login Attempts"
section allows you to define the user account deactivation
rules. Within this section, you can define the following
options:
-
Login
Attempt: Enter the maximum allowable number
of unsuccessful logon attempts before the system locks
your account.
-
Deactivate
After: Select the time period (in days) after
which the system will automatically deactivate your
account if there's no logon activity. The options
are 15, 30, or 60 days.
-
Delete
After: Select the time period (in days) after
which the system will automatically delete your account
if there's no logon activity. The options are 80,
100, or 120 days.
-
The "API Keys"
section allows you to define the rules regarding API authentication
(see API Authentication
for more details on how to request an API token). Within
this section, you can define the following options:
-
Login
Attempts: Enter the maximum allowable number
of unsuccessful API token requests before the system
locks your account
-
Deactivate
Token After: Select the time period (in hours)
after which the system will automatically deactivate
your API token, and require you to request a new token.
-
When finished, click
save policy.
|
Click hereClick here
By default, the
platform comes with five Access Groups that are typically
sufficient for most needs. These groups can be edited (see
"View or Edit an Access Group" below), or new groups
can be created, if needed.
To create a new
Access Group:
-
If you have access
to multiple client accounts, the pane along the left-hand
side of the Security Settings screen lists all of these
accounts. Click on the desired account. The Security Settings
screen is refreshed to show the list of Access Groups
for this account. If an account has been configured with
a Parent
/ Child architecture, click the arrow icon next to
the Parent system to expand it, and view a list of all
the Child systems.
-
Above the list of existing
Access Groups, click new group.
The "Edit Access Group Rights" pop-up window
is displayed.
-
In the "Group
Name" field, enter a name for this new Access Group.
-
The "Edit Access
Group Rights" pop-up window displays a list of all
the various features and options within the platform,
organized into functional areas, such as "Campaigns"
or "Reporting," for example. For each feature,
place a check mark next to the permissible actions allowed
by users in this Access Group. The available actions will
vary between functional areas. For example, the Campaign
section includes all the different channels, and you can
configure the ability to "Read," "Create,"
"Update," "Delete," "Proof,"
"Launch," and / or "Approve" a Campaign
for each channel. The pop-up window provides the following
features to make it easier to make the desired selections:
-
The "Jump
to" section at the bottom of the window allows
you to quickly navigate between the different functional
areas.
-
To check all
of the check boxes within a column, click the column
header. Click the column header again to uncheck all
the check boxes in this column.
-
To check all
of the check boxes within a row, click the feature
name. Click the feature name again to uncheck all
the check boxes in this row.
-
To check all
of the check boxes within a functional area, click
the "Select all" link in the top-right corner
of the functional area. Click this link again to uncheck
all the check boxes in this area.
-
To check all
of the check boxes, across all functional areas, click
the "Select all" link within the "Jump
to" section. Click this link again to uncheck
all of the check boxes across all functional areas.
-
When finished, click
save group.
|
Click hereClick here
By default, the
platform comes with five Access Groups that are typically
sufficient for most needs. These groups can be edited, or
new groups can be created (see "Create a New Access Group"
above), if needed.
To view or edit
an existing Access Group:
-
If you have access
to multiple client accounts, the pane along the left-hand
side of the Security Settings screen lists all of these
accounts. Click on the desired account. The Security Settings
screen is refreshed to show the list of Access Groups
for this account. If an account has been configured with
a Parent
/ Child architecture, click the arrow icon next to
the Parent system to expand it, and view a list of all
the Child systems.
-
Click the desired Access
Group. The "Edit Access Group Rights" pop-up
window is displayed and populated with the current permission
settings for this group.
-
Optionally, in the
"Group Name" field, enter a new name for this
new Access Group.
-
The "Edit Access
Group Rights" pop-up window displays a list of all
the various features and options within the platform,
organized into functional areas, such as "Campaigns"
or "Reporting," for example. If necessary, check
or uncheck the permissible actions allowed by users in
this Access Group. The pop-up window provides the following
features to make it easier to make the desired modifications:
-
The "Jump
to" section at the bottom of the window allows
you to quickly navigate between the different functional
areas.
-
To check all
of the check boxes within a column, click the column
header. Click the column header again to uncheck all
the check boxes in this column.
-
To check all
of the check boxes within a row, click the feature
name. Click the feature name again to uncheck all
the check boxes in this row.
-
To check all
of the check boxes within a functional area, click
the "Select all" link in the top-right corner
of the functional area. Click this link again to uncheck
all the check boxes in this area.
-
To check all
of the check boxes, across all functional areas, click
the "Select all" link within the "Jump
to" section. Click this link again to uncheck
all of the check boxes across all functional areas.
-
When finished, click
save group.
|
Click hereClick here
Clients who need
to restrict user access to the Messaging application can define
a whitelist of valid IP addresses from which their users must
access the platform. For example, if you want to force your
users to log into the application only from their work computers,
you could whitelist your corporate IP address. The whitelisted
IP addresses are assigned to an Access Group, so that any
user who is then assigned to this Access Group must conform
to the IP address restriction.
To define a Whitelist
IP Address for an Access Group:
-
If you have access
to multiple client accounts, the pane along the left-hand
side of the Security Settings screen lists all of these
accounts. Click on the desired account. The Security Settings
screen is refreshed to show the list of Access Groups
for this account. If an account has been configured with
a Parent
/ Child architecture, click the arrow icon next to
the Parent system to expand it, and view a list of all
the Child systems.
-
Next to the desired
Access Group name, click the IP Whitelist icon. The "Edit
IP Whitelist" pop-up window is displayed and populated
with any previously-assigned IP addresses.
-
To enter a new IP address,
select the type of IP address:
Single AddressSingle Address
To define a
single IP Address:
-
From the "Address
Type" drop-down menu, select "Single
Address."
-
In the "IP
Address" field, enter the IP address.
-
Click the add
button (plus-sign icon). The system adds the new
IP address to the list.
Address RangeAddress Range
To define a
range of IP addresses:
-
From the "Address
Type" drop-down menu, select "Address
Range."
-
In the "IP
Address" field, enter the IP address.
-
In the "Subnet
Mask" field, enter the subnet mask.
-
Click the add
button (plus-sign icon). The system adds the new
IP address and subnet mask to the list.
Classless Inter-Domain Routing (CIDR)Classless Inter-Domain Routing (CIDR)
To define a
Classless Inter-Domain Routing (sometimes called "supernetting"):
-
From the "Address
Type" drop-down menu, select "CIDR."
-
In the "IP
Address" field, enter the IP address.
-
In the "Routing
Prefix" field, enter the network prefix.
-
Click the add
button (plus-sign icon). The system adds the new
IP address and network prefix to the list.
-
If you need to remove
an IP address from the whitelist, click the remove button
("X" icon). A confirmation dialog box is displayed.
Click delete record.
-
When finished, click
close.
|