Difference between revisions of "Security and Best Practice"

From Charitylog Manual
Jump to: navigation, search
Line 34: Line 34:
  
 
To set the password rules please see [[Operational Rules#Password Rules|Operational Rules]].
 
To set the password rules please see [[Operational Rules#Password Rules|Operational Rules]].
 +
 +
==Failed logins==
 +
A person can be restricted access the system if they enter an incorrect user name or password, this helps prevent or delay 'Brute for Force' attempts.
 +
 +
[[File:SBP_lockout.PNG]]
 +
 +
You can specify a time period before the user can log back in and a set number of attempts.  This is recommended to be set from 10 to 30 minutes after 3 failed attempts.  If you specify that the administrator must unlock the account then the time is ignored.  The administrator would need to go to the [[Uesers]] record to unlock the account.  To set these rules please see [[Operational Rules#Security Rules - Failed logins|Operational Rules]].
 +
 +
 +
Further information being added to this page.
 +
Project Access
 +
Group Access
 +
IP addresses
 +
See my own client
 +
Lock out
 +
Days of the week and which system
 +
Field sets
 +
 +
----
 +
[[File:helpheader_small.png|right]]

Revision as of 12:27, 6 March 2019

Helpheader small.png

The system has a host of security features as standard with a wide range of additional options. On this page you will find details of features and guides to make you system even more secure.

Security related to users logging in

In this section you will find features related to the general access of the system.

User name rules

This feature is planned to be replaced with the use of email addresses for users.

At present you can force user names to have a minumum length, to include upper-case characters and numbers.

File:SBP username.PNG

To use this feature please see Operational Rules.

Password rules

The system can force users to use secure complex passwords. This will reduce chance of passwords being guessed by unauthorised people. Password rules are also used to protect against 'Brute Force Attacks' (when a combination of characters for the user name and password are entered until access is granted).

The following rules are available:

  • Minimum Length of User Passwords - Recommended to be at least 8 digits in length.
  • Minimum Number of Upper Case Characters In Password - Recommended to include at least one upper-case character.
  • Minimum Number of Numeric Characters In Password - Recommended to include at least one numeric character.
  • Minimum Number of Non Alpha-numeric Characters (_:!&()?-@,.+) in Password - Recommended to include at least one special character.
  • Maximum Number of Identical Consecutive Characters In Password - Recommended to be set to two.
  • Allow User's System Username In Password - Recommended to not allow user names in the password.
  • Allow User's Real Name In Password - Recommended not to allow a persons real name to be used in a password.
  • Allow Organisation Name In Password - Recommended not to allow the organisations name to be used in a password.
  • Allow Browser to Save Username and Password - This tells the browser that the password is not to be saved (stored) on the local machine (this is ignored by some browsers).
  • Do not allow the reuse of previous Passwords - Recommended that at least 10 different passwords variations should be used before re-using a previous password.
  • Number of Days Before User Password Change Required - This is recommended to be set to a period between 30 and 90 days.

Password security is essential to protect the data in the system. The above are general reconsiderations, however making passwords too secure can also threaten security. If passwords are made to be too complicated for users to remember, there is a high chance that the user may be tempted to write them down (or even attach them to their monitor or underside of their keyboard).

To set the password rules please see Operational Rules.

Failed logins

A person can be restricted access the system if they enter an incorrect user name or password, this helps prevent or delay 'Brute for Force' attempts.

File:SBP lockout.PNG

You can specify a time period before the user can log back in and a set number of attempts. This is recommended to be set from 10 to 30 minutes after 3 failed attempts. If you specify that the administrator must unlock the account then the time is ignored. The administrator would need to go to the Uesers record to unlock the account. To set these rules please see Operational Rules.


Further information being added to this page. Project Access Group Access IP addresses See my own client Lock out Days of the week and which system Field sets


Helpheader small.png