Roles and Security

You can configure settings such as the roles and permissions that allow employees to access TrackTik features, safelist IPs, and set a password policy.


Settings > Roles & Security

22cc82ef-c64e-4438-9ec4-ec3c6937f108.png

Options:

  • Roles/Permissions
    • Determine the features that your users can access.
  • Password Policy
    • Set password restrictions for your account.
  • IP White list
    • Allow access to laptops that are used to access TrackTik instead of a device. An example is a security guard assigned to a fixed location, such as a front gate. 
  • Sign-in Log
    • User’s sign-in/out history.

 

Roles and Permissions

You can configure the features that your users can access by assigning each user to one of the pre-configured default roles.

Default Roles include:

  • Admin Portal Roles: Administrator
  • Admin Portal Roles: Manager
  • Staff Portal Roles: Guard
  • Client Portal Roles: Client Role

You can reach out to your TrackTik client success representative for assistance in configuring custom Roles and Permissions.

 

Password Policy

Set the password to the minimum requirements for TrackTik users in this tab.

a867eb4e-e32e-43fd-becc-3bef8acb5ded.png

Disallow user info (First and Last name): Check this option to prevent users from including their first and last names in passwords.

Disallow passwords already used: Check this option to prevent users from using passwords they have already used.

Avoid commonly used popular password: Check this option to prevent users from using easy-to-guess passwords.

 

IP Whitelist

Configure this option to safelist IP addresses and prevent users from logging in if they are not doing so from an IP address on the safelist.

10a25f41-c75e-46c5-887e-1d49164789aa.png

IP to authorize: Enter the IP address you would like to whitelist.

IP Label (Optional): Enter a name or description for the safelisted IP. Choose something meaningful and descriptive.

Scenarios (Block at login): When this option is checked, employees cannot log in if they are not doing so from an IP address on the safe list.

 

Sign-in Logs

Under this tab, you can track the employees who signed in and from which IPs they signed in.

a567668b-9020-4d2d-9439-d81d4052c3a2.png

User: The first and last name of the user.

IP: The IP address from which the user logged in.

Time: The time and date stamp of the sign-in.

Was this article helpful?
1 out of 1 found this helpful

Articles in this section

See more