Settings: Roles and Security

Follow

In this section, you can configure settings such as the roles and permissions that allow employees to access TrackTik features, safelist IPs, and set a password policy.

Security options include:

  • Roles/Permissions
    • Determine the features that your employees can access.
  • Password Policy
    • Set restrictions for the type of passwords that can be used in your account.
  • IP White list
    • Allow access to laptops that are used to access TrackTik instead of a device. Example: an officer assigned to a stationary location such as a front gate. 
  • Sign-in Log.
    • Officers’ sign in/out history.
22cc82ef-c64e-4438-9ec4-ec3c6937f108.png

Roles and Permissions

Please talk to your TrackTik representative for assistance in configuring Roles and Permissions.

Password Policy

Set password requirements for TrackTik users in this tab.

a867eb4e-e32e-43fd-becc-3bef8acb5ded.png

Minimum Length: This is the minimum character requirement for TrackTik passwords.

Minimum Capital Letters: The minimum number of capital letters required for a TrackTik password.

Minimum Numbers (e.g., 0...9): Set the minimum number of numbers allowed in a TrackTik password.

Minimum Symbols (e.g. !@#$%&): Enter the minimum number of symbols required for a TrackTik password.

Disallow user info (First and Last name): Check this option to prevent users from including their first and last names in passwords.

Disallow passwords already used: Check this option to prevent users from using passwords they have already used.

Avoid commonly used popular password: Check this option to prevent users from using passwords that are easy to guess.

IP Whitelist

Configure this option to whitelist IP addresses and prevent users from logging in if they are not doing so from a whitelisted IP.

10a25f41-c75e-46c5-887e-1d49164789aa.png

IP to authorize: Enter the IP address you would like to whitelist.

IP Label (Optional): Enter a name or description for the whitelisted IP. Choose something meaningful and descriptive.

Scenarios (Block at login): When this option is checked, employees cannot log in if they are not doing so from a whitelisted IP address.

Sign-in Logs

Under this tab, you will be able to track the employees who signed in, and from which IPs they signed in.

a567668b-9020-4d2d-9439-d81d4052c3a2.png

User: The first and last name of the user.

IP: The IP address from which the user logged in.

Time: The time and date stamp of the sign-in.

Comments

0 comments
Please sign in to leave a comment.