In this submodule you can configure and establish certain parameters to give users access to the platform. You can also get credentiales for the APIs.

These tabs make up the parameters and configurations:

  • Password

  • Two-step authentication

  • API connection

  • SSO

Password

In this tab you can establish the configuration of passwords for access and starting a session on the platform with these parameters:

  • Minimum password length

  • Frequency in months for password change

  • Number of unsuccessful login attempts before blocking account

  • Must contain special characters

Note: The above options depend on the type of plan or add-ons that have been contracted. There is also an addition that allows users to update the passwords on the platform.

Two-step authentication

In this tab you can establish a two-step configuration with a QR code reading that can be verified with applications like Google Authenticator, Microsoft Authenticator or Authy from a smartphone. This way you’ll have an extra level of security for accessing the platform.

API connection

In this tab, the person who has a Super Administrator account can create the credentials for API access and use of information. Meaning that with this option, they can get their database API Key and API Secret.

SSO

In this tab you can establish parameters for authenticating access to the platform by means different from those predetermined (Google or Microsoft accounts).

SAML (Security Assertion Markup Language), is a standard that allows the exchange of information for starting a session (authentication and authorization) or SSO between different parts (applications). The participants in this authentication are the identity provider and the service provider. The service provider is the entity that gives a user permission to access a resource.

Fracttal acts as the service provider. The identity provider is the entity that provides the infrastructure necessary for user authentication. In this case, the identity provider is the application that is registered with users and that controls their access. Some examples of applications that can be identity providers are Active Directory and Okta, among others.

Did this answer your question?