LogicalDOC Security Systems

LogicalDOC
LogicalDOCLogicalDOC

Storing confidential documents is important. It is even MORE important to know that these documents are always protected and available to the designed users. With LogicalDOC, the Admin will take control over the security settings and decide how to protect his documentation. The software has a lot of options that will customize the experience of every single user: it will be possible to create a secure connection for anonymous users, manage the security settings of specific documentation of folders, create reports for the most important updates and many other features that will allow a secure access to your documents. For this reason, we created a small presentation that will show you all the possibilities that a document management system like LogicalDOC has to offer.

SECURITY SYSTEMS
Introduction
Storing confidential documents is important.
It is even MORE important to know that
these documents are always protected and
available to the designed users.
With LogicalDOC, the Admin will take control
over the security settings and decide how to
protect his documentation.
The software has a lot of options that will
customise the experience of every single
user: it will be possible to create a secure
You can store the documents and
LogicalDOC repositories wherever you want
and be able to access to them in the easiest
way possible! Just open your browser, insert
the URL where you installed LogicalDOC
and access to your version of LogicalDOC
document Management System.
You don’t want that uninvited users access
with your credentials? Just unflag the case
“remember me” and you will be sure that the
browser will not save your username.
Access to your documents in a fast and secure way
SECURITY SISTEMS PG 1
1
connection for anonymous users, manage
the security settings of specific
documentation of folders, create reports for
the most important updates and many other
features that will allow a secure access to
your documents.
For this reason, we created a small
presentation that will show you all the
possibilities that a software like LogicalDOC
has to offer. Enjoy it!
As an administrator, you can change the security settings every time you need.
You can manage, for example, the expiration date of your password: choose the
maximum duration allowed before the system notifies the users and forces it to
change the password. In this way you will always be sure that the user’s access is
secured.
You can also manage a lot of other settings related to the password, such as the
minimum length, the possibility to save the user credentials in the browser or the
option to redirect HTTP requests to HTTPS secure protocols.
Help your users and remind them when to change
the password for a more secure connection
SECURITY SISTEMS PG 2
2
Create a secure connection for anonymous users
and choose what they can visualize at any moment3
Sometimes you want to share non-confidential material with one of your partners
but you don’t want to create a new user for it. LogicalDOC gives you the
opportunity to grant access to anonymous users without passing through the login
page.
Once you enable it, you will be able to share an URL: when someone access to
this URL, it will be automatically logged in as an anonymous user.
SECURITY SISTEMS PG 3
3
With a few clicks of your mouse you are going to be able to choose who can
access specific documentations or folders, thanks to the User and Groups
management system.
At any given moment you can add a new user by filling in the minimum required
information (such as Username, email address, First name, last name, language
and Group) and assign to it the right permissions.
If you want to manage the access in the easiest way possible, you can create
different groups with specific accesses and avoid to lose your time assign access
to users, one-by-one.
Using the Quota feature, you will always be able to control how much data a user
can upload in the system.
Choose who’s going to be able to visualize
specific documentations or folders 4
Give special access to a specific folder for
the most important documentation5
Whenever you are working on a restricted authorized project, you can always
insert all the documentation in a folder and change the security policies of the
same. By going in the Security Tab of the folder, you will able to control the
actions that can be executed by specific users or groups.
SECURITY SISTEMS PG 4
3
5
You can decide that the group XXX can only read the resources in the folder
while the group ZZZ will be also able to Delete, modify and download the
documents and files in the folder.
You created a project folder and you want to be sure to be updated every time
there is a change in one of its documents, or you want to know when a new
file is uploaded. LogicalDOC allows you to receive documentation and to
extract several reports using the Reports and Event Subscription feature.
Keep under control all the important documents
or your projects with the notification feature 6
The Event Subscription feature is perfect for
the job, because if you want to be informed
whenever a change or an update occur in the
system, you can automatically request to
receive email notifications every time a
document is modified or a document is added
to a determined folder.
Make sure that your documents are not
infected with an integrated antivirus7
You don’t want to upload an infected document in your documentation
management system: Trojan and other malware could harm your company by
leaking important information. LogicalDOC works with ClamAV, an open-
source antivirus software that can check every document as soon as you start
to upload it in the system.
SECURITY SISTEMS PG 5
3
You can enable the Antivirus check at any given moment and with ClamAV
you will always be able to choose which file to check: the Antivirus is a highly
customisable tool that will make sure that your documents are safe at all time.
One of the most common ways that allow a Hacker to access a system is a Brute
Force Attack: the Hacker will try Username and password until doesn’t find the
correct combination to enter.
LogicalDOC protects you from this kind of attacks: you can decide to block a
username whenever its login authentication fails a determined amount of time, or
to block an IP that tries to log in without success a certain amount of times.
Protect yourself from Hackers with LogicalDOC’s
Brute force attack defensive mechanism 8
7
SECURITY SISTEMS PG 6
Ban unwanted IPs or users with
LogicalDOC integrated firewall9
You discovered that there is a suspicious user that keeps accessing through a
specific IP? LogicalDOC has a specific Firewall feature that will allow to
manage the access from specific IPs, networks and hostnames.
You can even choose to allow the access to the system only when accessing
with the IP of your office!
If you work with different clients that use ActiverDirectory and LDAP
system, LogicalDOC will be allow you to access through them after a fast
configuration.
By inserting the URL of the external authentication server, the Username, the
Password, The User Base Node and the Groups base node, you will be able to
automatically connect from other systems.
Complete compatibility with external LDAP and ActiveDirectory
authentication systems with a secure external connection 10
SECURITY SISTEMS PG 7
3
Protect entire repositories with by encrypting
your storages11
You can storage your documents in different repositories: Storages can be
created in Local folders, Remote Folders, Amazon S3 buckets and Microsoft
Azure containers.
But did you know that you can protect each and every one of them by
activating the encryption mode of the storage type you are using?
Once you activate this mode, all the documents are going to be encrypted and
you will be able to access to it only with the correct user and password.
In this way, if someone is able to replicate and transfer information from the
storage, it will not able to read it without the credentials.
Protect each document with a customized
password 12
SECURITY SISTEMS PG 8
Whenever you need to keep secret a confidential document and you want to
share it with a limited number of people, you will be able to protect it at any time
with a password.
Click on the document and set a password with a few clicks.
Please notice - give the password to a limited number of users: accessing the
document doesn’t require extra credential.
12
Want to be twice as safer while storing and monitoring
your documents? Use two factor authentication tools13
Username and password are the most common way to log in in a website or a
software, but they are not always the safest way to protect your sensible data:
for this reason it was invented the 2FA, which is an extra level of security that
you can add when authenticating.
But how does it works? After you insert your username and password, the
system normally requires an extra step: this one could be an SMS to your
phone, or to plug in a device that could be recognised by the software.
LogicalDOC found a solution that will allow you to protect your file with this
technology thanks to the new support with Google Authenticator and Yubico.
In the Tab Administration you can click on the dropbox list Security, then Two
Factors Authentication.
At this point it is possible to select if you want to enable Google Authenticator
or Yubikey.
SECURITY SISTEMS PG 9
13
Once you select one of your preferences, the log in screen it should requires
an extra information that you can obtain following the 2FA procedure.
SECURITY SISTEMS PG 9
14
Single Sign-on is definitely an extremely convenient feature for any
LogicalDOC user!
The Central Authentication Service (CAS) is the most used single sign-on
protocol for the web. It's purpose is to permit a user to access multiple
applications while providing their credentials (such as userid and password)
only once.
It also allows web applications to authenticate users without gaining access to
a user's security credentials, such as a password. The name CAS also refers
to a software package that implements this protocol.
The convenience of single sign-on in total
security
Head Quarters
LogicalDOC
14-25 Plaza Road
Suite N-3-5
Fair Lawn, NJ 07410
USA
+1 (800) 654 2827
sales@logicaldoc.com
USA and Canada
Europe Quarters
LogicalDOC Srl
via Aldo Moro interna, 3
41012, Carpi
Italy
+39 059 5970906
+39 059 640508
info@logicaldoc.com
Worldwide
German Contact
INDUS-VBS GmbH
Bitzenhofer Weg, 3b
86453 Dasing
Germany
+49 8205 969992
Germany and Austria
FIND Us!!

Recommended

LogicalDOC Ecosystem by
LogicalDOC EcosystemLogicalDOC Ecosystem
LogicalDOC EcosystemLogicalDOC
4.4K views1 slide
LogicalDOC - Technical Paper by
LogicalDOC - Technical PaperLogicalDOC - Technical Paper
LogicalDOC - Technical PaperLogicalDOC
2.9K views10 slides
LogicalDOC Clustering by
LogicalDOC ClusteringLogicalDOC Clustering
LogicalDOC ClusteringLogicalDOC
133 views14 slides
LogicalDOC Introduction by
LogicalDOC IntroductionLogicalDOC Introduction
LogicalDOC IntroductionLogicalDOC
6K views14 slides
LogicalDOC - Convenient and easy document management system by
LogicalDOC - Convenient and easy document management systemLogicalDOC - Convenient and easy document management system
LogicalDOC - Convenient and easy document management systemLogicalDOC
14.4K views8 slides
Transitioning From a Paper-based to Paperless Office System by
Transitioning From a Paper-based to Paperless Office SystemTransitioning From a Paper-based to Paperless Office System
Transitioning From a Paper-based to Paperless Office SystemLogicalDOC
3.5K views12 slides

More Related Content

What's hot

Sicurezza in LogicalDOC by
Sicurezza in LogicalDOCSicurezza in LogicalDOC
Sicurezza in LogicalDOCLogicalDOC
617 views12 slides
LogicalDOC il Sistema di Gestione Documentale pratico e conveniente by
LogicalDOC il Sistema di Gestione Documentale pratico e convenienteLogicalDOC il Sistema di Gestione Documentale pratico e conveniente
LogicalDOC il Sistema di Gestione Documentale pratico e convenienteLogicalDOC
1.2K views8 slides
A Secure Journey to Cloud with Microsoft 365 by
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
612 views38 slides
Microsoft Office 365 for Enterprise - Presented by Atidan by
Microsoft Office 365 for Enterprise - Presented by AtidanMicrosoft Office 365 for Enterprise - Presented by Atidan
Microsoft Office 365 for Enterprise - Presented by AtidanDavid J Rosenthal
3.7K views42 slides
Microsoft 365 Business Applications by
Microsoft 365  Business ApplicationsMicrosoft 365  Business Applications
Microsoft 365 Business ApplicationsCloudCoverIT
183 views16 slides
Microsoft 365 business presentation by
Microsoft 365 business presentationMicrosoft 365 business presentation
Microsoft 365 business presentationGordon Pong
810 views24 slides

What's hot(20)

Sicurezza in LogicalDOC by LogicalDOC
Sicurezza in LogicalDOCSicurezza in LogicalDOC
Sicurezza in LogicalDOC
LogicalDOC617 views
LogicalDOC il Sistema di Gestione Documentale pratico e conveniente by LogicalDOC
LogicalDOC il Sistema di Gestione Documentale pratico e convenienteLogicalDOC il Sistema di Gestione Documentale pratico e conveniente
LogicalDOC il Sistema di Gestione Documentale pratico e conveniente
LogicalDOC1.2K views
A Secure Journey to Cloud with Microsoft 365 by David J Rosenthal
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
David J Rosenthal612 views
Microsoft Office 365 for Enterprise - Presented by Atidan by David J Rosenthal
Microsoft Office 365 for Enterprise - Presented by AtidanMicrosoft Office 365 for Enterprise - Presented by Atidan
Microsoft Office 365 for Enterprise - Presented by Atidan
David J Rosenthal3.7K views
Microsoft 365 Business Applications by CloudCoverIT
Microsoft 365  Business ApplicationsMicrosoft 365  Business Applications
Microsoft 365 Business Applications
CloudCoverIT183 views
Microsoft 365 business presentation by Gordon Pong
Microsoft 365 business presentationMicrosoft 365 business presentation
Microsoft 365 business presentation
Gordon Pong810 views
Being more secure using Microsoft 365 Business by Robert Crane
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
Robert Crane1.8K views
Introduction to Microsoft 365 by Robert Crane
Introduction to Microsoft 365Introduction to Microsoft 365
Introduction to Microsoft 365
Robert Crane26.4K views
Overview of Microsoft Teams and Data Loss Prevention(DLP) by Radhakrishnan Govindan
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
March 2023 CIAOPS Need to Know Webinar by Robert Crane
March 2023 CIAOPS Need to Know WebinarMarch 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know Webinar
Robert Crane700 views
Sharepoint Document Management System (DMS) Features by Nitin Gupta
Sharepoint Document Management System (DMS) Features Sharepoint Document Management System (DMS) Features
Sharepoint Document Management System (DMS) Features
Nitin Gupta12.3K views
Pitching Microsoft 365 by Robert Crane
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
Robert Crane4.9K views
Introduction to Microsoft 365 Business by Robert Crane
Introduction to Microsoft 365 BusinessIntroduction to Microsoft 365 Business
Introduction to Microsoft 365 Business
Robert Crane8.8K views
Introducing Microsoft's Cloud - Session 16 by William Mann
Introducing Microsoft's Cloud - Session 16Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16
William Mann1.4K views
SharePoint 2013 Document Management Features by Thuan Ng
SharePoint 2013 Document Management FeaturesSharePoint 2013 Document Management Features
SharePoint 2013 Document Management Features
Thuan Ng11K views
Office 365 Presentation - Renato Civili, Infosoft Systems by Infosoft Systems
Office 365 Presentation - Renato Civili, Infosoft SystemsOffice 365 Presentation - Renato Civili, Infosoft Systems
Office 365 Presentation - Renato Civili, Infosoft Systems
Infosoft Systems719 views

Similar to LogicalDOC Security Systems

IRM Secure on SecuLogica Technical Whitepaper by
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperJim Kitchen
481 views23 slides
Secure File Sharing Basics - What Every File Sharing Provider Should Have by
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should HaveBoxHQ
1.4K views12 slides
Paperless office by
Paperless officePaperless office
Paperless officeLogicalDOC
3K views2 slides
Chapter 09 by
Chapter 09Chapter 09
Chapter 09cclay3
550 views29 slides
Network Security 2016 by
Network Security 2016 Network Security 2016
Network Security 2016 Mukesh Pathak
185 views38 slides
8 isecurity database by
8 isecurity database8 isecurity database
8 isecurity databaseAnil Pandey
715 views31 slides

Similar to LogicalDOC Security Systems(20)

IRM Secure on SecuLogica Technical Whitepaper by Jim Kitchen
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical Whitepaper
Jim Kitchen481 views
Secure File Sharing Basics - What Every File Sharing Provider Should Have by BoxHQ
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
BoxHQ1.4K views
Paperless office by LogicalDOC
Paperless officePaperless office
Paperless office
LogicalDOC3K views
Chapter 09 by cclay3
Chapter 09Chapter 09
Chapter 09
cclay3550 views
Network Security 2016 by Mukesh Pathak
Network Security 2016 Network Security 2016
Network Security 2016
Mukesh Pathak185 views
8 isecurity database by Anil Pandey
8 isecurity database8 isecurity database
8 isecurity database
Anil Pandey715 views
Vista Presentation by sdrayin
Vista PresentationVista Presentation
Vista Presentation
sdrayin1.5K views
Document Management System or Digital Folder.pptx by BIS Safety
Document Management System or Digital Folder.pptxDocument Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptx
BIS Safety18 views
Presentation On CLoudSweeper By Harini Anand by Harini Anandakumar
Presentation On CLoudSweeper By Harini AnandPresentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini Anand
Harini Anandakumar1.5K views
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud by Nag Nani
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
Nag Nani1.1K views
A Survey on Assured deletion and Access Control by AM Publications
A Survey on Assured deletion and Access ControlA Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access Control
AM Publications234 views
Securing Source Code on Endpoints by thomashelsley
Securing Source Code on EndpointsSecuring Source Code on Endpoints
Securing Source Code on Endpoints
thomashelsley21 views
Achieving Secure, sclable and finegrained Cloud computing report by Kiran Girase
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase489 views
ENSURE SEAMLESS DILIGENCE WITH VIRTUAL DATA ROOMS!.pdf by Home
ENSURE SEAMLESS DILIGENCE  WITH VIRTUAL DATA ROOMS!.pdfENSURE SEAMLESS DILIGENCE  WITH VIRTUAL DATA ROOMS!.pdf
ENSURE SEAMLESS DILIGENCE WITH VIRTUAL DATA ROOMS!.pdf
Home2 views
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo... by Editor IJCATR
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR124 views

Recently uploaded

DevsRank by
DevsRankDevsRank
DevsRankdevsrank786
11 views1 slide
SUGCON ANZ Presentation V2.1 Final.pptx by
SUGCON ANZ Presentation V2.1 Final.pptxSUGCON ANZ Presentation V2.1 Final.pptx
SUGCON ANZ Presentation V2.1 Final.pptxJack Spektor
22 views34 slides
SAP FOR CONTRACT MANUFACTURING.pdf by
SAP FOR CONTRACT MANUFACTURING.pdfSAP FOR CONTRACT MANUFACTURING.pdf
SAP FOR CONTRACT MANUFACTURING.pdfVirendra Rai, PMP
11 views2 slides
Keep by
KeepKeep
KeepGeniusee
75 views10 slides
DSD-INT 2023 Delft3D FM Suite 2024.01 2D3D - New features + Improvements - Ge... by
DSD-INT 2023 Delft3D FM Suite 2024.01 2D3D - New features + Improvements - Ge...DSD-INT 2023 Delft3D FM Suite 2024.01 2D3D - New features + Improvements - Ge...
DSD-INT 2023 Delft3D FM Suite 2024.01 2D3D - New features + Improvements - Ge...Deltares
17 views12 slides
Headless JS UG Presentation.pptx by
Headless JS UG Presentation.pptxHeadless JS UG Presentation.pptx
Headless JS UG Presentation.pptxJack Spektor
7 views24 slides

Recently uploaded(20)

SUGCON ANZ Presentation V2.1 Final.pptx by Jack Spektor
SUGCON ANZ Presentation V2.1 Final.pptxSUGCON ANZ Presentation V2.1 Final.pptx
SUGCON ANZ Presentation V2.1 Final.pptx
Jack Spektor22 views
DSD-INT 2023 Delft3D FM Suite 2024.01 2D3D - New features + Improvements - Ge... by Deltares
DSD-INT 2023 Delft3D FM Suite 2024.01 2D3D - New features + Improvements - Ge...DSD-INT 2023 Delft3D FM Suite 2024.01 2D3D - New features + Improvements - Ge...
DSD-INT 2023 Delft3D FM Suite 2024.01 2D3D - New features + Improvements - Ge...
Deltares17 views
Headless JS UG Presentation.pptx by Jack Spektor
Headless JS UG Presentation.pptxHeadless JS UG Presentation.pptx
Headless JS UG Presentation.pptx
Jack Spektor7 views
DSD-INT 2023 The Danube Hazardous Substances Model - Kovacs by Deltares
DSD-INT 2023 The Danube Hazardous Substances Model - KovacsDSD-INT 2023 The Danube Hazardous Substances Model - Kovacs
DSD-INT 2023 The Danube Hazardous Substances Model - Kovacs
Deltares8 views
Navigating container technology for enhanced security by Niklas Saari by Metosin Oy
Navigating container technology for enhanced security by Niklas SaariNavigating container technology for enhanced security by Niklas Saari
Navigating container technology for enhanced security by Niklas Saari
Metosin Oy13 views
Copilot Prompting Toolkit_All Resources.pdf by Riccardo Zamana
Copilot Prompting Toolkit_All Resources.pdfCopilot Prompting Toolkit_All Resources.pdf
Copilot Prompting Toolkit_All Resources.pdf
Riccardo Zamana8 views
AI and Ml presentation .pptx by FayazAli87
AI and Ml presentation .pptxAI and Ml presentation .pptx
AI and Ml presentation .pptx
FayazAli8711 views
Gen Apps on Google Cloud PaLM2 and Codey APIs in Action by Márton Kodok
Gen Apps on Google Cloud PaLM2 and Codey APIs in ActionGen Apps on Google Cloud PaLM2 and Codey APIs in Action
Gen Apps on Google Cloud PaLM2 and Codey APIs in Action
Márton Kodok5 views
Software testing company in India.pptx by SakshiPatel82
Software testing company in India.pptxSoftware testing company in India.pptx
Software testing company in India.pptx
SakshiPatel827 views
Dev-HRE-Ops - Addressing the _Last Mile DevOps Challenge_ in Highly Regulated... by TomHalpin9
Dev-HRE-Ops - Addressing the _Last Mile DevOps Challenge_ in Highly Regulated...Dev-HRE-Ops - Addressing the _Last Mile DevOps Challenge_ in Highly Regulated...
Dev-HRE-Ops - Addressing the _Last Mile DevOps Challenge_ in Highly Regulated...
TomHalpin95 views
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -... by Deltares
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...
Deltares6 views
DSD-INT 2023 Leveraging the results of a 3D hydrodynamic model to improve the... by Deltares
DSD-INT 2023 Leveraging the results of a 3D hydrodynamic model to improve the...DSD-INT 2023 Leveraging the results of a 3D hydrodynamic model to improve the...
DSD-INT 2023 Leveraging the results of a 3D hydrodynamic model to improve the...
Deltares6 views
A first look at MariaDB 11.x features and ideas on how to use them by Federico Razzoli
A first look at MariaDB 11.x features and ideas on how to use themA first look at MariaDB 11.x features and ideas on how to use them
A first look at MariaDB 11.x features and ideas on how to use them
Federico Razzoli45 views
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ... by Deltares
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...
Deltares10 views
FIMA 2023 Neo4j & FS - Entity Resolution.pptx by Neo4j
FIMA 2023 Neo4j & FS - Entity Resolution.pptxFIMA 2023 Neo4j & FS - Entity Resolution.pptx
FIMA 2023 Neo4j & FS - Entity Resolution.pptx
Neo4j6 views
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ... by Donato Onofri
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...
Donato Onofri795 views

LogicalDOC Security Systems

  • 2. Introduction Storing confidential documents is important. It is even MORE important to know that these documents are always protected and available to the designed users. With LogicalDOC, the Admin will take control over the security settings and decide how to protect his documentation. The software has a lot of options that will customise the experience of every single user: it will be possible to create a secure You can store the documents and LogicalDOC repositories wherever you want and be able to access to them in the easiest way possible! Just open your browser, insert the URL where you installed LogicalDOC and access to your version of LogicalDOC document Management System. You don’t want that uninvited users access with your credentials? Just unflag the case “remember me” and you will be sure that the browser will not save your username. Access to your documents in a fast and secure way SECURITY SISTEMS PG 1 1 connection for anonymous users, manage the security settings of specific documentation of folders, create reports for the most important updates and many other features that will allow a secure access to your documents. For this reason, we created a small presentation that will show you all the possibilities that a software like LogicalDOC has to offer. Enjoy it!
  • 3. As an administrator, you can change the security settings every time you need. You can manage, for example, the expiration date of your password: choose the maximum duration allowed before the system notifies the users and forces it to change the password. In this way you will always be sure that the user’s access is secured. You can also manage a lot of other settings related to the password, such as the minimum length, the possibility to save the user credentials in the browser or the option to redirect HTTP requests to HTTPS secure protocols. Help your users and remind them when to change the password for a more secure connection SECURITY SISTEMS PG 2 2 Create a secure connection for anonymous users and choose what they can visualize at any moment3 Sometimes you want to share non-confidential material with one of your partners but you don’t want to create a new user for it. LogicalDOC gives you the opportunity to grant access to anonymous users without passing through the login page. Once you enable it, you will be able to share an URL: when someone access to this URL, it will be automatically logged in as an anonymous user.
  • 4. SECURITY SISTEMS PG 3 3 With a few clicks of your mouse you are going to be able to choose who can access specific documentations or folders, thanks to the User and Groups management system. At any given moment you can add a new user by filling in the minimum required information (such as Username, email address, First name, last name, language and Group) and assign to it the right permissions. If you want to manage the access in the easiest way possible, you can create different groups with specific accesses and avoid to lose your time assign access to users, one-by-one. Using the Quota feature, you will always be able to control how much data a user can upload in the system. Choose who’s going to be able to visualize specific documentations or folders 4 Give special access to a specific folder for the most important documentation5 Whenever you are working on a restricted authorized project, you can always insert all the documentation in a folder and change the security policies of the same. By going in the Security Tab of the folder, you will able to control the actions that can be executed by specific users or groups.
  • 5. SECURITY SISTEMS PG 4 3 5 You can decide that the group XXX can only read the resources in the folder while the group ZZZ will be also able to Delete, modify and download the documents and files in the folder. You created a project folder and you want to be sure to be updated every time there is a change in one of its documents, or you want to know when a new file is uploaded. LogicalDOC allows you to receive documentation and to extract several reports using the Reports and Event Subscription feature. Keep under control all the important documents or your projects with the notification feature 6 The Event Subscription feature is perfect for the job, because if you want to be informed whenever a change or an update occur in the system, you can automatically request to receive email notifications every time a document is modified or a document is added to a determined folder. Make sure that your documents are not infected with an integrated antivirus7 You don’t want to upload an infected document in your documentation management system: Trojan and other malware could harm your company by leaking important information. LogicalDOC works with ClamAV, an open- source antivirus software that can check every document as soon as you start to upload it in the system.
  • 6. SECURITY SISTEMS PG 5 3 You can enable the Antivirus check at any given moment and with ClamAV you will always be able to choose which file to check: the Antivirus is a highly customisable tool that will make sure that your documents are safe at all time. One of the most common ways that allow a Hacker to access a system is a Brute Force Attack: the Hacker will try Username and password until doesn’t find the correct combination to enter. LogicalDOC protects you from this kind of attacks: you can decide to block a username whenever its login authentication fails a determined amount of time, or to block an IP that tries to log in without success a certain amount of times. Protect yourself from Hackers with LogicalDOC’s Brute force attack defensive mechanism 8 7
  • 7. SECURITY SISTEMS PG 6 Ban unwanted IPs or users with LogicalDOC integrated firewall9 You discovered that there is a suspicious user that keeps accessing through a specific IP? LogicalDOC has a specific Firewall feature that will allow to manage the access from specific IPs, networks and hostnames. You can even choose to allow the access to the system only when accessing with the IP of your office! If you work with different clients that use ActiverDirectory and LDAP system, LogicalDOC will be allow you to access through them after a fast configuration. By inserting the URL of the external authentication server, the Username, the Password, The User Base Node and the Groups base node, you will be able to automatically connect from other systems. Complete compatibility with external LDAP and ActiveDirectory authentication systems with a secure external connection 10
  • 8. SECURITY SISTEMS PG 7 3 Protect entire repositories with by encrypting your storages11 You can storage your documents in different repositories: Storages can be created in Local folders, Remote Folders, Amazon S3 buckets and Microsoft Azure containers. But did you know that you can protect each and every one of them by activating the encryption mode of the storage type you are using? Once you activate this mode, all the documents are going to be encrypted and you will be able to access to it only with the correct user and password. In this way, if someone is able to replicate and transfer information from the storage, it will not able to read it without the credentials. Protect each document with a customized password 12
  • 9. SECURITY SISTEMS PG 8 Whenever you need to keep secret a confidential document and you want to share it with a limited number of people, you will be able to protect it at any time with a password. Click on the document and set a password with a few clicks. Please notice - give the password to a limited number of users: accessing the document doesn’t require extra credential. 12 Want to be twice as safer while storing and monitoring your documents? Use two factor authentication tools13 Username and password are the most common way to log in in a website or a software, but they are not always the safest way to protect your sensible data: for this reason it was invented the 2FA, which is an extra level of security that you can add when authenticating. But how does it works? After you insert your username and password, the system normally requires an extra step: this one could be an SMS to your phone, or to plug in a device that could be recognised by the software. LogicalDOC found a solution that will allow you to protect your file with this technology thanks to the new support with Google Authenticator and Yubico. In the Tab Administration you can click on the dropbox list Security, then Two Factors Authentication. At this point it is possible to select if you want to enable Google Authenticator or Yubikey.
  • 10. SECURITY SISTEMS PG 9 13 Once you select one of your preferences, the log in screen it should requires an extra information that you can obtain following the 2FA procedure.
  • 11. SECURITY SISTEMS PG 9 14 Single Sign-on is definitely an extremely convenient feature for any LogicalDOC user! The Central Authentication Service (CAS) is the most used single sign-on protocol for the web. It's purpose is to permit a user to access multiple applications while providing their credentials (such as userid and password) only once. It also allows web applications to authenticate users without gaining access to a user's security credentials, such as a password. The name CAS also refers to a software package that implements this protocol. The convenience of single sign-on in total security
  • 12. Head Quarters LogicalDOC 14-25 Plaza Road Suite N-3-5 Fair Lawn, NJ 07410 USA +1 (800) 654 2827 sales@logicaldoc.com USA and Canada Europe Quarters LogicalDOC Srl via Aldo Moro interna, 3 41012, Carpi Italy +39 059 5970906 +39 059 640508 info@logicaldoc.com Worldwide German Contact INDUS-VBS GmbH Bitzenhofer Weg, 3b 86453 Dasing Germany +49 8205 969992 Germany and Austria FIND Us!!