SlideShare a Scribd company logo
1 of 12
Download to read offline
SECURITY SYSTEMS
Introduction
Storing confidential documents is important.
It is even MORE important to know that
these documents are always protected and
available to the designed users.
With LogicalDOC, the Admin will take control
over the security settings and decide how to
protect his documentation.
The software has a lot of options that will
customise the experience of every single
user: it will be possible to create a secure
You can store the documents and
LogicalDOC repositories wherever you want
and be able to access to them in the easiest
way possible! Just open your browser, insert
the URL where you installed LogicalDOC
and access to your version of LogicalDOC
document Management System.
You don’t want that uninvited users access
with your credentials? Just unflag the case
“remember me” and you will be sure that the
browser will not save your username.
Access to your documents in a fast and secure way
SECURITY SISTEMS PG 1
1
connection for anonymous users, manage
the security settings of specific
documentation of folders, create reports for
the most important updates and many other
features that will allow a secure access to
your documents.
For this reason, we created a small
presentation that will show you all the
possibilities that a software like LogicalDOC
has to offer. Enjoy it!
As an administrator, you can change the security settings every time you need.
You can manage, for example, the expiration date of your password: choose the
maximum duration allowed before the system notifies the users and forces it to
change the password. In this way you will always be sure that the user’s access is
secured.
You can also manage a lot of other settings related to the password, such as the
minimum length, the possibility to save the user credentials in the browser or the
option to redirect HTTP requests to HTTPS secure protocols.
Help your users and remind them when to change
the password for a more secure connection
SECURITY SISTEMS PG 2
2
Create a secure connection for anonymous users
and choose what they can visualize at any moment3
Sometimes you want to share non-confidential material with one of your partners
but you don’t want to create a new user for it. LogicalDOC gives you the
opportunity to grant access to anonymous users without passing through the login
page.
Once you enable it, you will be able to share an URL: when someone access to
this URL, it will be automatically logged in as an anonymous user.
SECURITY SISTEMS PG 3
3
With a few clicks of your mouse you are going to be able to choose who can
access specific documentations or folders, thanks to the User and Groups
management system.
At any given moment you can add a new user by filling in the minimum required
information (such as Username, email address, First name, last name, language
and Group) and assign to it the right permissions.
If you want to manage the access in the easiest way possible, you can create
different groups with specific accesses and avoid to lose your time assign access
to users, one-by-one.
Using the Quota feature, you will always be able to control how much data a user
can upload in the system.
Choose who’s going to be able to visualize
specific documentations or folders 4
Give special access to a specific folder for
the most important documentation5
Whenever you are working on a restricted authorized project, you can always
insert all the documentation in a folder and change the security policies of the
same. By going in the Security Tab of the folder, you will able to control the
actions that can be executed by specific users or groups.
SECURITY SISTEMS PG 4
3
5
You can decide that the group XXX can only read the resources in the folder
while the group ZZZ will be also able to Delete, modify and download the
documents and files in the folder.
You created a project folder and you want to be sure to be updated every time
there is a change in one of its documents, or you want to know when a new
file is uploaded. LogicalDOC allows you to receive documentation and to
extract several reports using the Reports and Event Subscription feature.
Keep under control all the important documents
or your projects with the notification feature 6
The Event Subscription feature is perfect for
the job, because if you want to be informed
whenever a change or an update occur in the
system, you can automatically request to
receive email notifications every time a
document is modified or a document is added
to a determined folder.
Make sure that your documents are not
infected with an integrated antivirus7
You don’t want to upload an infected document in your documentation
management system: Trojan and other malware could harm your company by
leaking important information. LogicalDOC works with ClamAV, an open-
source antivirus software that can check every document as soon as you start
to upload it in the system.
SECURITY SISTEMS PG 5
3
You can enable the Antivirus check at any given moment and with ClamAV
you will always be able to choose which file to check: the Antivirus is a highly
customisable tool that will make sure that your documents are safe at all time.
One of the most common ways that allow a Hacker to access a system is a Brute
Force Attack: the Hacker will try Username and password until doesn’t find the
correct combination to enter.
LogicalDOC protects you from this kind of attacks: you can decide to block a
username whenever its login authentication fails a determined amount of time, or
to block an IP that tries to log in without success a certain amount of times.
Protect yourself from Hackers with LogicalDOC’s
Brute force attack defensive mechanism 8
7
SECURITY SISTEMS PG 6
Ban unwanted IPs or users with
LogicalDOC integrated firewall9
You discovered that there is a suspicious user that keeps accessing through a
specific IP? LogicalDOC has a specific Firewall feature that will allow to
manage the access from specific IPs, networks and hostnames.
You can even choose to allow the access to the system only when accessing
with the IP of your office!
If you work with different clients that use ActiverDirectory and LDAP
system, LogicalDOC will be allow you to access through them after a fast
configuration.
By inserting the URL of the external authentication server, the Username, the
Password, The User Base Node and the Groups base node, you will be able to
automatically connect from other systems.
Complete compatibility with external LDAP and ActiveDirectory
authentication systems with a secure external connection 10
SECURITY SISTEMS PG 7
3
Protect entire repositories with by encrypting
your storages11
You can storage your documents in different repositories: Storages can be
created in Local folders, Remote Folders, Amazon S3 buckets and Microsoft
Azure containers.
But did you know that you can protect each and every one of them by
activating the encryption mode of the storage type you are using?
Once you activate this mode, all the documents are going to be encrypted and
you will be able to access to it only with the correct user and password.
In this way, if someone is able to replicate and transfer information from the
storage, it will not able to read it without the credentials.
Protect each document with a customized
password 12
SECURITY SISTEMS PG 8
Whenever you need to keep secret a confidential document and you want to
share it with a limited number of people, you will be able to protect it at any time
with a password.
Click on the document and set a password with a few clicks.
Please notice - give the password to a limited number of users: accessing the
document doesn’t require extra credential.
12
Want to be twice as safer while storing and monitoring
your documents? Use two factor authentication tools13
Username and password are the most common way to log in in a website or a
software, but they are not always the safest way to protect your sensible data:
for this reason it was invented the 2FA, which is an extra level of security that
you can add when authenticating.
But how does it works? After you insert your username and password, the
system normally requires an extra step: this one could be an SMS to your
phone, or to plug in a device that could be recognised by the software.
LogicalDOC found a solution that will allow you to protect your file with this
technology thanks to the new support with Google Authenticator and Yubico.
In the Tab Administration you can click on the dropbox list Security, then Two
Factors Authentication.
At this point it is possible to select if you want to enable Google Authenticator
or Yubikey.
SECURITY SISTEMS PG 9
13
Once you select one of your preferences, the log in screen it should requires
an extra information that you can obtain following the 2FA procedure.
SECURITY SISTEMS PG 9
14
Single Sign-on is definitely an extremely convenient feature for any
LogicalDOC user!
The Central Authentication Service (CAS) is the most used single sign-on
protocol for the web. It's purpose is to permit a user to access multiple
applications while providing their credentials (such as userid and password)
only once.
It also allows web applications to authenticate users without gaining access to
a user's security credentials, such as a password. The name CAS also refers
to a software package that implements this protocol.
The convenience of single sign-on in total
security
Head Quarters
LogicalDOC
14-25 Plaza Road
Suite N-3-5
Fair Lawn, NJ 07410
USA
+1 (800) 654 2827
sales@logicaldoc.com
USA and Canada
Europe Quarters
LogicalDOC Srl
via Aldo Moro interna, 3
41012, Carpi
Italy
+39 059 5970906
+39 059 640508
info@logicaldoc.com
Worldwide
German Contact
INDUS-VBS GmbH
Bitzenhofer Weg, 3b
86453 Dasing
Germany
+49 8205 969992
Germany and Austria
FIND Us!!

More Related Content

What's hot

SINGLE SIGN ON (SSO) WITH SECURITY ASSERTION MAKUP LANGUAGE (SAML)
SINGLE SIGN ON (SSO)  WITH SECURITY ASSERTION  MAKUP LANGUAGE (SAML)SINGLE SIGN ON (SSO)  WITH SECURITY ASSERTION  MAKUP LANGUAGE (SAML)
SINGLE SIGN ON (SSO) WITH SECURITY ASSERTION MAKUP LANGUAGE (SAML)Minh Tri Lam
 
Advantages of SharePoint Online
Advantages of SharePoint OnlineAdvantages of SharePoint Online
Advantages of SharePoint OnlineRishabh Software
 
What is Office 365 | Benifits of Office 365 | Learn Office 365
What is Office 365 | Benifits of Office 365 | Learn Office 365What is Office 365 | Benifits of Office 365 | Learn Office 365
What is Office 365 | Benifits of Office 365 | Learn Office 365Gloire Tech
 
How to get prepared for SharePoint Syntex
How to get prepared for SharePoint SyntexHow to get prepared for SharePoint Syntex
How to get prepared for SharePoint SyntexNicolas Georgeault
 
OneDrive Quick Start Guide
OneDrive Quick Start GuideOneDrive Quick Start Guide
OneDrive Quick Start GuideHixon Group
 
Using runbot to test all your developments automatically
Using runbot to test all your developments automaticallyUsing runbot to test all your developments automatically
Using runbot to test all your developments automaticallyOdoo
 
Beginner's Guide to Google Drive
Beginner's Guide to Google DriveBeginner's Guide to Google Drive
Beginner's Guide to Google Drivejanice almada
 
Changing the game with cloud dw
Changing the game with cloud dwChanging the game with cloud dw
Changing the game with cloud dwelephantscale
 
Azure active directory
Azure active directoryAzure active directory
Azure active directoryRaju Kumar
 
The SQL Server 2022 Workshop.pptx
The SQL Server 2022 Workshop.pptxThe SQL Server 2022 Workshop.pptx
The SQL Server 2022 Workshop.pptxUmooraMinhaji
 
Deploying a Modern Data Stack by Lasse Benninga - GoDataFest 2022
Deploying a Modern Data Stack by Lasse Benninga - GoDataFest 2022Deploying a Modern Data Stack by Lasse Benninga - GoDataFest 2022
Deploying a Modern Data Stack by Lasse Benninga - GoDataFest 2022GoDataDriven
 
Introduction to snowflake
Introduction to snowflakeIntroduction to snowflake
Introduction to snowflakeSunil Gurav
 

What's hot (20)

SINGLE SIGN ON (SSO) WITH SECURITY ASSERTION MAKUP LANGUAGE (SAML)
SINGLE SIGN ON (SSO)  WITH SECURITY ASSERTION  MAKUP LANGUAGE (SAML)SINGLE SIGN ON (SSO)  WITH SECURITY ASSERTION  MAKUP LANGUAGE (SAML)
SINGLE SIGN ON (SSO) WITH SECURITY ASSERTION MAKUP LANGUAGE (SAML)
 
Google Workspace
Google WorkspaceGoogle Workspace
Google Workspace
 
Office 365
Office 365Office 365
Office 365
 
Google Drive
Google DriveGoogle Drive
Google Drive
 
MS Office 365
MS Office 365MS Office 365
MS Office 365
 
Advantages of SharePoint Online
Advantages of SharePoint OnlineAdvantages of SharePoint Online
Advantages of SharePoint Online
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
 
Google Drive
Google DriveGoogle Drive
Google Drive
 
What is Office 365 | Benifits of Office 365 | Learn Office 365
What is Office 365 | Benifits of Office 365 | Learn Office 365What is Office 365 | Benifits of Office 365 | Learn Office 365
What is Office 365 | Benifits of Office 365 | Learn Office 365
 
How to get prepared for SharePoint Syntex
How to get prepared for SharePoint SyntexHow to get prepared for SharePoint Syntex
How to get prepared for SharePoint Syntex
 
OneDrive Quick Start Guide
OneDrive Quick Start GuideOneDrive Quick Start Guide
OneDrive Quick Start Guide
 
Using runbot to test all your developments automatically
Using runbot to test all your developments automaticallyUsing runbot to test all your developments automatically
Using runbot to test all your developments automatically
 
Beginner's Guide to Google Drive
Beginner's Guide to Google DriveBeginner's Guide to Google Drive
Beginner's Guide to Google Drive
 
Changing the game with cloud dw
Changing the game with cloud dwChanging the game with cloud dw
Changing the game with cloud dw
 
Data Loss Prevention in Office 365
Data Loss Prevention in Office 365Data Loss Prevention in Office 365
Data Loss Prevention in Office 365
 
Azure active directory
Azure active directoryAzure active directory
Azure active directory
 
The SQL Server 2022 Workshop.pptx
The SQL Server 2022 Workshop.pptxThe SQL Server 2022 Workshop.pptx
The SQL Server 2022 Workshop.pptx
 
WP Media Startup Culture
WP Media Startup CultureWP Media Startup Culture
WP Media Startup Culture
 
Deploying a Modern Data Stack by Lasse Benninga - GoDataFest 2022
Deploying a Modern Data Stack by Lasse Benninga - GoDataFest 2022Deploying a Modern Data Stack by Lasse Benninga - GoDataFest 2022
Deploying a Modern Data Stack by Lasse Benninga - GoDataFest 2022
 
Introduction to snowflake
Introduction to snowflakeIntroduction to snowflake
Introduction to snowflake
 

Similar to LogicalDOC Security Systems

IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperJim Kitchen
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should HaveBoxHQ
 
Paperless office
Paperless officePaperless office
Paperless officeLogicalDOC
 
Chapter 09
Chapter 09Chapter 09
Chapter 09cclay3
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016 Mukesh Pathak
 
8 isecurity database
8 isecurity database8 isecurity database
8 isecurity databaseAnil Pandey
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 
Document Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxDocument Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxBIS Safety
 
Presentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini AnandPresentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini AnandHarini Anandakumar
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloudNag Nani
 
A Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access ControlA Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access ControlAM Publications
 
Securing Source Code on Endpoints
Securing Source Code on EndpointsSecuring Source Code on Endpoints
Securing Source Code on Endpointsthomashelsley
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedPhillip Stalnaker
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryptionRuban Deventhiran
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfMassimo Bertaccini
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 

Similar to LogicalDOC Security Systems (20)

IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical Whitepaper
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
 
Paperless office
Paperless officePaperless office
Paperless office
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016
 
8 isecurity database
8 isecurity database8 isecurity database
8 isecurity database
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
DoChronicle
DoChronicleDoChronicle
DoChronicle
 
Document Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxDocument Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptx
 
Presentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini AnandPresentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini Anand
 
Zyncro security
Zyncro securityZyncro security
Zyncro security
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
 
A Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access ControlA Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access Control
 
Securing Source Code on Endpoints
Securing Source Code on EndpointsSecuring Source Code on Endpoints
Securing Source Code on Endpoints
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdf
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Mona final review
Mona final reviewMona final review
Mona final review
 

Recently uploaded

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 

Recently uploaded (20)

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 

LogicalDOC Security Systems

  • 2. Introduction Storing confidential documents is important. It is even MORE important to know that these documents are always protected and available to the designed users. With LogicalDOC, the Admin will take control over the security settings and decide how to protect his documentation. The software has a lot of options that will customise the experience of every single user: it will be possible to create a secure You can store the documents and LogicalDOC repositories wherever you want and be able to access to them in the easiest way possible! Just open your browser, insert the URL where you installed LogicalDOC and access to your version of LogicalDOC document Management System. You don’t want that uninvited users access with your credentials? Just unflag the case “remember me” and you will be sure that the browser will not save your username. Access to your documents in a fast and secure way SECURITY SISTEMS PG 1 1 connection for anonymous users, manage the security settings of specific documentation of folders, create reports for the most important updates and many other features that will allow a secure access to your documents. For this reason, we created a small presentation that will show you all the possibilities that a software like LogicalDOC has to offer. Enjoy it!
  • 3. As an administrator, you can change the security settings every time you need. You can manage, for example, the expiration date of your password: choose the maximum duration allowed before the system notifies the users and forces it to change the password. In this way you will always be sure that the user’s access is secured. You can also manage a lot of other settings related to the password, such as the minimum length, the possibility to save the user credentials in the browser or the option to redirect HTTP requests to HTTPS secure protocols. Help your users and remind them when to change the password for a more secure connection SECURITY SISTEMS PG 2 2 Create a secure connection for anonymous users and choose what they can visualize at any moment3 Sometimes you want to share non-confidential material with one of your partners but you don’t want to create a new user for it. LogicalDOC gives you the opportunity to grant access to anonymous users without passing through the login page. Once you enable it, you will be able to share an URL: when someone access to this URL, it will be automatically logged in as an anonymous user.
  • 4. SECURITY SISTEMS PG 3 3 With a few clicks of your mouse you are going to be able to choose who can access specific documentations or folders, thanks to the User and Groups management system. At any given moment you can add a new user by filling in the minimum required information (such as Username, email address, First name, last name, language and Group) and assign to it the right permissions. If you want to manage the access in the easiest way possible, you can create different groups with specific accesses and avoid to lose your time assign access to users, one-by-one. Using the Quota feature, you will always be able to control how much data a user can upload in the system. Choose who’s going to be able to visualize specific documentations or folders 4 Give special access to a specific folder for the most important documentation5 Whenever you are working on a restricted authorized project, you can always insert all the documentation in a folder and change the security policies of the same. By going in the Security Tab of the folder, you will able to control the actions that can be executed by specific users or groups.
  • 5. SECURITY SISTEMS PG 4 3 5 You can decide that the group XXX can only read the resources in the folder while the group ZZZ will be also able to Delete, modify and download the documents and files in the folder. You created a project folder and you want to be sure to be updated every time there is a change in one of its documents, or you want to know when a new file is uploaded. LogicalDOC allows you to receive documentation and to extract several reports using the Reports and Event Subscription feature. Keep under control all the important documents or your projects with the notification feature 6 The Event Subscription feature is perfect for the job, because if you want to be informed whenever a change or an update occur in the system, you can automatically request to receive email notifications every time a document is modified or a document is added to a determined folder. Make sure that your documents are not infected with an integrated antivirus7 You don’t want to upload an infected document in your documentation management system: Trojan and other malware could harm your company by leaking important information. LogicalDOC works with ClamAV, an open- source antivirus software that can check every document as soon as you start to upload it in the system.
  • 6. SECURITY SISTEMS PG 5 3 You can enable the Antivirus check at any given moment and with ClamAV you will always be able to choose which file to check: the Antivirus is a highly customisable tool that will make sure that your documents are safe at all time. One of the most common ways that allow a Hacker to access a system is a Brute Force Attack: the Hacker will try Username and password until doesn’t find the correct combination to enter. LogicalDOC protects you from this kind of attacks: you can decide to block a username whenever its login authentication fails a determined amount of time, or to block an IP that tries to log in without success a certain amount of times. Protect yourself from Hackers with LogicalDOC’s Brute force attack defensive mechanism 8 7
  • 7. SECURITY SISTEMS PG 6 Ban unwanted IPs or users with LogicalDOC integrated firewall9 You discovered that there is a suspicious user that keeps accessing through a specific IP? LogicalDOC has a specific Firewall feature that will allow to manage the access from specific IPs, networks and hostnames. You can even choose to allow the access to the system only when accessing with the IP of your office! If you work with different clients that use ActiverDirectory and LDAP system, LogicalDOC will be allow you to access through them after a fast configuration. By inserting the URL of the external authentication server, the Username, the Password, The User Base Node and the Groups base node, you will be able to automatically connect from other systems. Complete compatibility with external LDAP and ActiveDirectory authentication systems with a secure external connection 10
  • 8. SECURITY SISTEMS PG 7 3 Protect entire repositories with by encrypting your storages11 You can storage your documents in different repositories: Storages can be created in Local folders, Remote Folders, Amazon S3 buckets and Microsoft Azure containers. But did you know that you can protect each and every one of them by activating the encryption mode of the storage type you are using? Once you activate this mode, all the documents are going to be encrypted and you will be able to access to it only with the correct user and password. In this way, if someone is able to replicate and transfer information from the storage, it will not able to read it without the credentials. Protect each document with a customized password 12
  • 9. SECURITY SISTEMS PG 8 Whenever you need to keep secret a confidential document and you want to share it with a limited number of people, you will be able to protect it at any time with a password. Click on the document and set a password with a few clicks. Please notice - give the password to a limited number of users: accessing the document doesn’t require extra credential. 12 Want to be twice as safer while storing and monitoring your documents? Use two factor authentication tools13 Username and password are the most common way to log in in a website or a software, but they are not always the safest way to protect your sensible data: for this reason it was invented the 2FA, which is an extra level of security that you can add when authenticating. But how does it works? After you insert your username and password, the system normally requires an extra step: this one could be an SMS to your phone, or to plug in a device that could be recognised by the software. LogicalDOC found a solution that will allow you to protect your file with this technology thanks to the new support with Google Authenticator and Yubico. In the Tab Administration you can click on the dropbox list Security, then Two Factors Authentication. At this point it is possible to select if you want to enable Google Authenticator or Yubikey.
  • 10. SECURITY SISTEMS PG 9 13 Once you select one of your preferences, the log in screen it should requires an extra information that you can obtain following the 2FA procedure.
  • 11. SECURITY SISTEMS PG 9 14 Single Sign-on is definitely an extremely convenient feature for any LogicalDOC user! The Central Authentication Service (CAS) is the most used single sign-on protocol for the web. It's purpose is to permit a user to access multiple applications while providing their credentials (such as userid and password) only once. It also allows web applications to authenticate users without gaining access to a user's security credentials, such as a password. The name CAS also refers to a software package that implements this protocol. The convenience of single sign-on in total security
  • 12. Head Quarters LogicalDOC 14-25 Plaza Road Suite N-3-5 Fair Lawn, NJ 07410 USA +1 (800) 654 2827 sales@logicaldoc.com USA and Canada Europe Quarters LogicalDOC Srl via Aldo Moro interna, 3 41012, Carpi Italy +39 059 5970906 +39 059 640508 info@logicaldoc.com Worldwide German Contact INDUS-VBS GmbH Bitzenhofer Weg, 3b 86453 Dasing Germany +49 8205 969992 Germany and Austria FIND Us!!