SlideShare a Scribd company logo
1 of 12
Download to read offline
SECURITY SYSTEMS
Introduction
Storing confidential documents is important.
It is even MORE important to know that
these documents are always protected and
available to the designed users.
With LogicalDOC, the Admin will take control
over the security settings and decide how to
protect his documentation.
The software has a lot of options that will
customise the experience of every single
user: it will be possible to create a secure
You can store the documents and
LogicalDOC repositories wherever you want
and be able to access to them in the easiest
way possible! Just open your browser, insert
the URL where you installed LogicalDOC
and access to your version of LogicalDOC
document Management System.
You don’t want that uninvited users access
with your credentials? Just unflag the case
“remember me” and you will be sure that the
browser will not save your username.
Access to your documents in a fast and secure way
SECURITY SISTEMS PG 1
1
connection for anonymous users, manage
the security settings of specific
documentation of folders, create reports for
the most important updates and many other
features that will allow a secure access to
your documents.
For this reason, we created a small
presentation that will show you all the
possibilities that a software like LogicalDOC
has to offer. Enjoy it!
As an administrator, you can change the security settings every time you need.
You can manage, for example, the expiration date of your password: choose the
maximum duration allowed before the system notifies the users and forces it to
change the password. In this way you will always be sure that the user’s access is
secured.
You can also manage a lot of other settings related to the password, such as the
minimum length, the possibility to save the user credentials in the browser or the
option to redirect HTTP requests to HTTPS secure protocols.
Help your users and remind them when to change
the password for a more secure connection
SECURITY SISTEMS PG 2
2
Create a secure connection for anonymous users
and choose what they can visualize at any moment3
Sometimes you want to share non-confidential material with one of your partners
but you don’t want to create a new user for it. LogicalDOC gives you the
opportunity to grant access to anonymous users without passing through the login
page.
Once you enable it, you will be able to share an URL: when someone access to
this URL, it will be automatically logged in as an anonymous user.
SECURITY SISTEMS PG 3
3
With a few clicks of your mouse you are going to be able to choose who can
access specific documentations or folders, thanks to the User and Groups
management system.
At any given moment you can add a new user by filling in the minimum required
information (such as Username, email address, First name, last name, language
and Group) and assign to it the right permissions.
If you want to manage the access in the easiest way possible, you can create
different groups with specific accesses and avoid to lose your time assign access
to users, one-by-one.
Using the Quota feature, you will always be able to control how much data a user
can upload in the system.
Choose who’s going to be able to visualize
specific documentations or folders 4
Give special access to a specific folder for
the most important documentation5
Whenever you are working on a restricted authorized project, you can always
insert all the documentation in a folder and change the security policies of the
same. By going in the Security Tab of the folder, you will able to control the
actions that can be executed by specific users or groups.
SECURITY SISTEMS PG 4
3
5
You can decide that the group XXX can only read the resources in the folder
while the group ZZZ will be also able to Delete, modify and download the
documents and files in the folder.
You created a project folder and you want to be sure to be updated every time
there is a change in one of its documents, or you want to know when a new
file is uploaded. LogicalDOC allows you to receive documentation and to
extract several reports using the Reports and Event Subscription feature.
Keep under control all the important documents
or your projects with the notification feature 6
The Event Subscription feature is perfect for
the job, because if you want to be informed
whenever a change or an update occur in the
system, you can automatically request to
receive email notifications every time a
document is modified or a document is added
to a determined folder.
Make sure that your documents are not
infected with an integrated antivirus7
You don’t want to upload an infected document in your documentation
management system: Trojan and other malware could harm your company by
leaking important information. LogicalDOC works with ClamAV, an open-
source antivirus software that can check every document as soon as you start
to upload it in the system.
SECURITY SISTEMS PG 5
3
You can enable the Antivirus check at any given moment and with ClamAV
you will always be able to choose which file to check: the Antivirus is a highly
customisable tool that will make sure that your documents are safe at all time.
One of the most common ways that allow a Hacker to access a system is a Brute
Force Attack: the Hacker will try Username and password until doesn’t find the
correct combination to enter.
LogicalDOC protects you from this kind of attacks: you can decide to block a
username whenever its login authentication fails a determined amount of time, or
to block an IP that tries to log in without success a certain amount of times.
Protect yourself from Hackers with LogicalDOC’s
Brute force attack defensive mechanism 8
7
SECURITY SISTEMS PG 6
Ban unwanted IPs or users with
LogicalDOC integrated firewall9
You discovered that there is a suspicious user that keeps accessing through a
specific IP? LogicalDOC has a specific Firewall feature that will allow to
manage the access from specific IPs, networks and hostnames.
You can even choose to allow the access to the system only when accessing
with the IP of your office!
If you work with different clients that use ActiverDirectory and LDAP
system, LogicalDOC will be allow you to access through them after a fast
configuration.
By inserting the URL of the external authentication server, the Username, the
Password, The User Base Node and the Groups base node, you will be able to
automatically connect from other systems.
Complete compatibility with external LDAP and ActiveDirectory
authentication systems with a secure external connection 10
SECURITY SISTEMS PG 7
3
Protect entire repositories with by encrypting
your storages11
You can storage your documents in different repositories: Storages can be
created in Local folders, Remote Folders, Amazon S3 buckets and Microsoft
Azure containers.
But did you know that you can protect each and every one of them by
activating the encryption mode of the storage type you are using?
Once you activate this mode, all the documents are going to be encrypted and
you will be able to access to it only with the correct user and password.
In this way, if someone is able to replicate and transfer information from the
storage, it will not able to read it without the credentials.
Protect each document with a customized
password 12
SECURITY SISTEMS PG 8
Whenever you need to keep secret a confidential document and you want to
share it with a limited number of people, you will be able to protect it at any time
with a password.
Click on the document and set a password with a few clicks.
Please notice - give the password to a limited number of users: accessing the
document doesn’t require extra credential.
12
Want to be twice as safer while storing and monitoring
your documents? Use two factor authentication tools13
Username and password are the most common way to log in in a website or a
software, but they are not always the safest way to protect your sensible data:
for this reason it was invented the 2FA, which is an extra level of security that
you can add when authenticating.
But how does it works? After you insert your username and password, the
system normally requires an extra step: this one could be an SMS to your
phone, or to plug in a device that could be recognised by the software.
LogicalDOC found a solution that will allow you to protect your file with this
technology thanks to the new support with Google Authenticator and Yubico.
In the Tab Administration you can click on the dropbox list Security, then Two
Factors Authentication.
At this point it is possible to select if you want to enable Google Authenticator
or Yubikey.
SECURITY SISTEMS PG 9
13
Once you select one of your preferences, the log in screen it should requires
an extra information that you can obtain following the 2FA procedure.
SECURITY SISTEMS PG 9
14
Single Sign-on is definitely an extremely convenient feature for any
LogicalDOC user!
The Central Authentication Service (CAS) is the most used single sign-on
protocol for the web. It's purpose is to permit a user to access multiple
applications while providing their credentials (such as userid and password)
only once.
It also allows web applications to authenticate users without gaining access to
a user's security credentials, such as a password. The name CAS also refers
to a software package that implements this protocol.
The convenience of single sign-on in total
security
Head Quarters
LogicalDOC
14-25 Plaza Road
Suite N-3-5
Fair Lawn, NJ 07410
USA
+1 (800) 654 2827
sales@logicaldoc.com
USA and Canada
Europe Quarters
LogicalDOC Srl
via Aldo Moro interna, 3
41012, Carpi
Italy
+39 059 5970906
+39 059 640508
info@logicaldoc.com
Worldwide
German Contact
INDUS-VBS GmbH
Bitzenhofer Weg, 3b
86453 Dasing
Germany
+49 8205 969992
Germany and Austria
FIND Us!!

More Related Content

What's hot

LogicalDOC il Sistema di Gestione Documentale pratico e conveniente
LogicalDOC il Sistema di Gestione Documentale pratico e convenienteLogicalDOC il Sistema di Gestione Documentale pratico e conveniente
LogicalDOC il Sistema di Gestione Documentale pratico e convenienteLogicalDOC
 
Sicurezza in LogicalDOC
Sicurezza in LogicalDOCSicurezza in LogicalDOC
Sicurezza in LogicalDOCLogicalDOC
 
Sharepoint Document Management System (DMS) Features
Sharepoint Document Management System (DMS) Features Sharepoint Document Management System (DMS) Features
Sharepoint Document Management System (DMS) Features Nitin Gupta
 
SharePoint Folders vs. Metadata
SharePoint Folders vs. MetadataSharePoint Folders vs. Metadata
SharePoint Folders vs. MetadataGregory Zelfond
 
SharePoint Information Architecture Best Practices
SharePoint Information Architecture Best PracticesSharePoint Information Architecture Best Practices
SharePoint Information Architecture Best PracticesStephanie Lemieux
 
Document Management System
Document Management SystemDocument Management System
Document Management SystemSuresh Ramani
 
SharePoint Folders vs. Metadata Best Practices
SharePoint Folders vs. Metadata Best PracticesSharePoint Folders vs. Metadata Best Practices
SharePoint Folders vs. Metadata Best PracticesChris Woodill
 
SharePoint Folders & Metadata
SharePoint Folders & MetadataSharePoint Folders & Metadata
SharePoint Folders & MetadataDrew Madelung
 
Core Archive for SAP Solutions
Core Archive for SAP SolutionsCore Archive for SAP Solutions
Core Archive for SAP SolutionsOpenText
 
Data Lake Architecture
Data Lake ArchitectureData Lake Architecture
Data Lake ArchitectureDATAVERSITY
 
Real time data integration best practices and architecture
Real time data integration best practices and architectureReal time data integration best practices and architecture
Real time data integration best practices and architectureBui Kiet
 
SharePoint: How to automatically assign managed metadata?
SharePoint: How to automatically assign managed metadata?SharePoint: How to automatically assign managed metadata?
SharePoint: How to automatically assign managed metadata?Layer2
 
SharePoint 2013 Document Management Features
SharePoint 2013 Document Management FeaturesSharePoint 2013 Document Management Features
SharePoint 2013 Document Management FeaturesThuan Ng
 
Office 365 Presentation - Renato Civili, Infosoft Systems
Office 365 Presentation - Renato Civili, Infosoft SystemsOffice 365 Presentation - Renato Civili, Infosoft Systems
Office 365 Presentation - Renato Civili, Infosoft SystemsInfosoft Systems
 
The Business Glossary, Data Dictionary, Data Catalog Trifecta
The Business Glossary, Data Dictionary, Data Catalog TrifectaThe Business Glossary, Data Dictionary, Data Catalog Trifecta
The Business Glossary, Data Dictionary, Data Catalog Trifectageorgefirican
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
Extended ecm for office 365 overview and roadmap
Extended ecm for office 365 overview and roadmapExtended ecm for office 365 overview and roadmap
Extended ecm for office 365 overview and roadmapOpenText
 
Microsoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyMicrosoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyDavid J Rosenthal
 

What's hot (20)

LogicalDOC il Sistema di Gestione Documentale pratico e conveniente
LogicalDOC il Sistema di Gestione Documentale pratico e convenienteLogicalDOC il Sistema di Gestione Documentale pratico e conveniente
LogicalDOC il Sistema di Gestione Documentale pratico e conveniente
 
Sicurezza in LogicalDOC
Sicurezza in LogicalDOCSicurezza in LogicalDOC
Sicurezza in LogicalDOC
 
Sharepoint Document Management System (DMS) Features
Sharepoint Document Management System (DMS) Features Sharepoint Document Management System (DMS) Features
Sharepoint Document Management System (DMS) Features
 
SharePoint Folders vs. Metadata
SharePoint Folders vs. MetadataSharePoint Folders vs. Metadata
SharePoint Folders vs. Metadata
 
SharePoint Information Architecture Best Practices
SharePoint Information Architecture Best PracticesSharePoint Information Architecture Best Practices
SharePoint Information Architecture Best Practices
 
Introduction to Document Management
Introduction to Document ManagementIntroduction to Document Management
Introduction to Document Management
 
Document Management System
Document Management SystemDocument Management System
Document Management System
 
Taxonomies for Users
Taxonomies for UsersTaxonomies for Users
Taxonomies for Users
 
SharePoint Folders vs. Metadata Best Practices
SharePoint Folders vs. Metadata Best PracticesSharePoint Folders vs. Metadata Best Practices
SharePoint Folders vs. Metadata Best Practices
 
SharePoint Folders & Metadata
SharePoint Folders & MetadataSharePoint Folders & Metadata
SharePoint Folders & Metadata
 
Core Archive for SAP Solutions
Core Archive for SAP SolutionsCore Archive for SAP Solutions
Core Archive for SAP Solutions
 
Data Lake Architecture
Data Lake ArchitectureData Lake Architecture
Data Lake Architecture
 
Real time data integration best practices and architecture
Real time data integration best practices and architectureReal time data integration best practices and architecture
Real time data integration best practices and architecture
 
SharePoint: How to automatically assign managed metadata?
SharePoint: How to automatically assign managed metadata?SharePoint: How to automatically assign managed metadata?
SharePoint: How to automatically assign managed metadata?
 
SharePoint 2013 Document Management Features
SharePoint 2013 Document Management FeaturesSharePoint 2013 Document Management Features
SharePoint 2013 Document Management Features
 
Office 365 Presentation - Renato Civili, Infosoft Systems
Office 365 Presentation - Renato Civili, Infosoft SystemsOffice 365 Presentation - Renato Civili, Infosoft Systems
Office 365 Presentation - Renato Civili, Infosoft Systems
 
The Business Glossary, Data Dictionary, Data Catalog Trifecta
The Business Glossary, Data Dictionary, Data Catalog TrifectaThe Business Glossary, Data Dictionary, Data Catalog Trifecta
The Business Glossary, Data Dictionary, Data Catalog Trifecta
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Extended ecm for office 365 overview and roadmap
Extended ecm for office 365 overview and roadmapExtended ecm for office 365 overview and roadmap
Extended ecm for office 365 overview and roadmap
 
Microsoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor TechnologyMicrosoft 365 Business - Presented by Razor Technology
Microsoft 365 Business - Presented by Razor Technology
 

Similar to LogicalDOC Security Systems

IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperJim Kitchen
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should HaveBoxHQ
 
Chapter 09
Chapter 09Chapter 09
Chapter 09cclay3
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016 Mukesh Pathak
 
8 isecurity database
8 isecurity database8 isecurity database
8 isecurity databaseAnil Pandey
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 
Document Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxDocument Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxBIS Safety
 
Presentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini AnandPresentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini AnandHarini Anandakumar
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloudNag Nani
 
A Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access ControlA Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access ControlAM Publications
 
Securing Source Code on Endpoints
Securing Source Code on EndpointsSecuring Source Code on Endpoints
Securing Source Code on Endpointsthomashelsley
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedPhillip Stalnaker
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryptionRuban Deventhiran
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfMassimo Bertaccini
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
LogicalDOC Flyer
LogicalDOC FlyerLogicalDOC Flyer
LogicalDOC FlyerLogicalDOC
 

Similar to LogicalDOC Security Systems (20)

IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical Whitepaper
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016
 
8 isecurity database
8 isecurity database8 isecurity database
8 isecurity database
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
DoChronicle
DoChronicleDoChronicle
DoChronicle
 
Document Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxDocument Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptx
 
Presentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini AnandPresentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini Anand
 
Zyncro security
Zyncro securityZyncro security
Zyncro security
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
 
A Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access ControlA Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access Control
 
Securing Source Code on Endpoints
Securing Source Code on EndpointsSecuring Source Code on Endpoints
Securing Source Code on Endpoints
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdf
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Mona final review
Mona final reviewMona final review
Mona final review
 
LogicalDOC Flyer
LogicalDOC FlyerLogicalDOC Flyer
LogicalDOC Flyer
 

Recently uploaded

Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 

Recently uploaded (20)

Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Odoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting ServiceOdoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting Service
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 

LogicalDOC Security Systems

  • 2. Introduction Storing confidential documents is important. It is even MORE important to know that these documents are always protected and available to the designed users. With LogicalDOC, the Admin will take control over the security settings and decide how to protect his documentation. The software has a lot of options that will customise the experience of every single user: it will be possible to create a secure You can store the documents and LogicalDOC repositories wherever you want and be able to access to them in the easiest way possible! Just open your browser, insert the URL where you installed LogicalDOC and access to your version of LogicalDOC document Management System. You don’t want that uninvited users access with your credentials? Just unflag the case “remember me” and you will be sure that the browser will not save your username. Access to your documents in a fast and secure way SECURITY SISTEMS PG 1 1 connection for anonymous users, manage the security settings of specific documentation of folders, create reports for the most important updates and many other features that will allow a secure access to your documents. For this reason, we created a small presentation that will show you all the possibilities that a software like LogicalDOC has to offer. Enjoy it!
  • 3. As an administrator, you can change the security settings every time you need. You can manage, for example, the expiration date of your password: choose the maximum duration allowed before the system notifies the users and forces it to change the password. In this way you will always be sure that the user’s access is secured. You can also manage a lot of other settings related to the password, such as the minimum length, the possibility to save the user credentials in the browser or the option to redirect HTTP requests to HTTPS secure protocols. Help your users and remind them when to change the password for a more secure connection SECURITY SISTEMS PG 2 2 Create a secure connection for anonymous users and choose what they can visualize at any moment3 Sometimes you want to share non-confidential material with one of your partners but you don’t want to create a new user for it. LogicalDOC gives you the opportunity to grant access to anonymous users without passing through the login page. Once you enable it, you will be able to share an URL: when someone access to this URL, it will be automatically logged in as an anonymous user.
  • 4. SECURITY SISTEMS PG 3 3 With a few clicks of your mouse you are going to be able to choose who can access specific documentations or folders, thanks to the User and Groups management system. At any given moment you can add a new user by filling in the minimum required information (such as Username, email address, First name, last name, language and Group) and assign to it the right permissions. If you want to manage the access in the easiest way possible, you can create different groups with specific accesses and avoid to lose your time assign access to users, one-by-one. Using the Quota feature, you will always be able to control how much data a user can upload in the system. Choose who’s going to be able to visualize specific documentations or folders 4 Give special access to a specific folder for the most important documentation5 Whenever you are working on a restricted authorized project, you can always insert all the documentation in a folder and change the security policies of the same. By going in the Security Tab of the folder, you will able to control the actions that can be executed by specific users or groups.
  • 5. SECURITY SISTEMS PG 4 3 5 You can decide that the group XXX can only read the resources in the folder while the group ZZZ will be also able to Delete, modify and download the documents and files in the folder. You created a project folder and you want to be sure to be updated every time there is a change in one of its documents, or you want to know when a new file is uploaded. LogicalDOC allows you to receive documentation and to extract several reports using the Reports and Event Subscription feature. Keep under control all the important documents or your projects with the notification feature 6 The Event Subscription feature is perfect for the job, because if you want to be informed whenever a change or an update occur in the system, you can automatically request to receive email notifications every time a document is modified or a document is added to a determined folder. Make sure that your documents are not infected with an integrated antivirus7 You don’t want to upload an infected document in your documentation management system: Trojan and other malware could harm your company by leaking important information. LogicalDOC works with ClamAV, an open- source antivirus software that can check every document as soon as you start to upload it in the system.
  • 6. SECURITY SISTEMS PG 5 3 You can enable the Antivirus check at any given moment and with ClamAV you will always be able to choose which file to check: the Antivirus is a highly customisable tool that will make sure that your documents are safe at all time. One of the most common ways that allow a Hacker to access a system is a Brute Force Attack: the Hacker will try Username and password until doesn’t find the correct combination to enter. LogicalDOC protects you from this kind of attacks: you can decide to block a username whenever its login authentication fails a determined amount of time, or to block an IP that tries to log in without success a certain amount of times. Protect yourself from Hackers with LogicalDOC’s Brute force attack defensive mechanism 8 7
  • 7. SECURITY SISTEMS PG 6 Ban unwanted IPs or users with LogicalDOC integrated firewall9 You discovered that there is a suspicious user that keeps accessing through a specific IP? LogicalDOC has a specific Firewall feature that will allow to manage the access from specific IPs, networks and hostnames. You can even choose to allow the access to the system only when accessing with the IP of your office! If you work with different clients that use ActiverDirectory and LDAP system, LogicalDOC will be allow you to access through them after a fast configuration. By inserting the URL of the external authentication server, the Username, the Password, The User Base Node and the Groups base node, you will be able to automatically connect from other systems. Complete compatibility with external LDAP and ActiveDirectory authentication systems with a secure external connection 10
  • 8. SECURITY SISTEMS PG 7 3 Protect entire repositories with by encrypting your storages11 You can storage your documents in different repositories: Storages can be created in Local folders, Remote Folders, Amazon S3 buckets and Microsoft Azure containers. But did you know that you can protect each and every one of them by activating the encryption mode of the storage type you are using? Once you activate this mode, all the documents are going to be encrypted and you will be able to access to it only with the correct user and password. In this way, if someone is able to replicate and transfer information from the storage, it will not able to read it without the credentials. Protect each document with a customized password 12
  • 9. SECURITY SISTEMS PG 8 Whenever you need to keep secret a confidential document and you want to share it with a limited number of people, you will be able to protect it at any time with a password. Click on the document and set a password with a few clicks. Please notice - give the password to a limited number of users: accessing the document doesn’t require extra credential. 12 Want to be twice as safer while storing and monitoring your documents? Use two factor authentication tools13 Username and password are the most common way to log in in a website or a software, but they are not always the safest way to protect your sensible data: for this reason it was invented the 2FA, which is an extra level of security that you can add when authenticating. But how does it works? After you insert your username and password, the system normally requires an extra step: this one could be an SMS to your phone, or to plug in a device that could be recognised by the software. LogicalDOC found a solution that will allow you to protect your file with this technology thanks to the new support with Google Authenticator and Yubico. In the Tab Administration you can click on the dropbox list Security, then Two Factors Authentication. At this point it is possible to select if you want to enable Google Authenticator or Yubikey.
  • 10. SECURITY SISTEMS PG 9 13 Once you select one of your preferences, the log in screen it should requires an extra information that you can obtain following the 2FA procedure.
  • 11. SECURITY SISTEMS PG 9 14 Single Sign-on is definitely an extremely convenient feature for any LogicalDOC user! The Central Authentication Service (CAS) is the most used single sign-on protocol for the web. It's purpose is to permit a user to access multiple applications while providing their credentials (such as userid and password) only once. It also allows web applications to authenticate users without gaining access to a user's security credentials, such as a password. The name CAS also refers to a software package that implements this protocol. The convenience of single sign-on in total security
  • 12. Head Quarters LogicalDOC 14-25 Plaza Road Suite N-3-5 Fair Lawn, NJ 07410 USA +1 (800) 654 2827 sales@logicaldoc.com USA and Canada Europe Quarters LogicalDOC Srl via Aldo Moro interna, 3 41012, Carpi Italy +39 059 5970906 +39 059 640508 info@logicaldoc.com Worldwide German Contact INDUS-VBS GmbH Bitzenhofer Weg, 3b 86453 Dasing Germany +49 8205 969992 Germany and Austria FIND Us!!