Are you new to SalesTitan and feeling a little lost when setting up your Enterprise account? We’re going to take you through everything you need to know when it comes to security and permissions so that you can protect your data and restrict changes within your account exactly the way that suits your team! Let’s get started!
What is an account admin?
You automatically take on the role of account administrator when you first establish a SalesTitan account! You can now give other team members extra executive privileges. What does this imply, though? The account manager has the power to manage every aspect of the account, from members and forums to security and payments.
This enables one team member to efficiently and safely oversee their team (or more, if you so choose). Read this guidance to discover more about the account manager position and all that they can accomplish.
You can handle any of your processes on a board. To manage everything from daily chores to month- or year-long projects, think of it as an organized, virtual blackboard where projects are kept. Let’s examine the various kinds of boards:
- Main Board – Everyone who is a team member within your account can see the Main Board
- Private Board – Only the board creator and the particular people they ask to join this board can see a private board
- Shareable Board – Enables you to share a board with individuals outside of your team or organization, such as customers, students, or independent contractors.
Check out this piece to learn more about the different kinds of boards and how to use them.
Dashboards are a wonderful method to consolidate essential information from various sites. You can add tools to it to monitor expenses, gauge team effort, comprehend project development, and do a lot more. Dashboards are available in two varieties:
- Main Dashboard – Any account user can access and engage with the main dashboard.
- Private Dashboard – Only members of the dashboard can see the private dashboard.
Check out this piece to find out more about different interface kinds and how to use them
Understanding the different permissions
Making sure that the appropriate individuals have access to your account and can view or modify specific data which is a crucial aspect of this structure. The area level, board level, column level, and even the object level can all be fully customized! The graph below illustrates how your account users can access the various board kinds in the two distinct workplace categories:
You can limit who has access to generate and modify data as well as who can examine specific data in your account! Let’s examine a few of these limitations:
- Board permissions
The board owner(s) of each board can regulate which information can be modified or altered by other board users. By choosing “Board permissions” from the three-dot option in the upper right corner of your board, you can access these abilities. Read this document to find out more about board permissions.
- Dashboard permissions
In contrast to boards, only dashboard owners have access to modify the dashboard’s content (including its applications and tools), while watching relies on the sort of dashboard. Anyone with access to the account can examine the data and sign up for a subscription on a Main Dashboard. Subscribers on Private Dashboards require an invitation from the dashboard administrator. Subscribers of Private Dashboards will only be able to access the data if they are users of all of the associated Private/Shareable Boards because dashboards are linked to multiple boards.
Everything you need to know about panel access is covered in this essay.
- Column permissions
Board administrators have the choice of limiting which sections other users on the board can view or modify by using column permissions. This is particularly useful if you have private data you don’t want other people to access or edit!
- Item permissions
Board owners can choose whether they want all users who have access to the board to be able to view every item on it or whether they only want users to be able to see the items that have been allocated to them by using item viewing permission. This adds yet another level of security and guarantees teamwork within a single location without endangering access to confidential information.
- Account permissions
You can choose which account users have access to particular functions using the account permissions feature found in the admin area of your account.
One of our top objectives is the confidentiality and secrecy of your team! We can promise you that responsible data custodianship is one of our company’s fundamental values because we are aware that you entrust SalesTitan with the security of your team’s information every day.
Along with encrypting all data and performing hourly backups (with important data being saved up every five minutes), we also keep watch of the most recent security community outputs, quickly update our services to address newly discovered flaws, and consistently ensure that we are utilizing the most recent technology.
Your account is additionally protected by two-factor verification, an audit log, and more sophisticated security features. Let’s look at them:
- Two-Factor Authentication
(TFA/2FA) is an additional layer of protection that needs more details to register in than just a passcode and login. On our platform, you have two 2FA choices for logging into your account: either by using a number from a verification program or by receiving an SMS to your cell phone. TFA aims to make it more difficult for prospective hackers to access your account and take your confidential information or identity. For more details, you can read this story.
- SAML Single Sign-on – Security Assertion Markup Language (SAML)
Through an identity provider (IDP) of your choosing, individuals can access SalesTitan (SP) using Security Assertion Markup Language (SAML). The user’s identity is moved from one location (the identity supplier) to another in order for it to function. (SalesTitan). In just a few simple steps, SalesTitan users can enable SAML! To find out more about it and how to put it up, read this piece. We presently work with OKTA, OneLogin, Azure AD, and Oracle as our primary SAML providers, but you also have the option to customize SAML 2.0 with the supplier of your choosing.
System for Cross-domain Identity Management (a.k.a. SCIM) SCIM, is a system for managing users across various apps. It makes it simple for an operations or IT staff to provision (add), deprovision (deactivate), and change user data for several apps at once. OneLogin, OKTA, or Azure AD can be used to put it up..
- Audit Log
The “Security” page of the Admin contains a link to the Audit Log. Which provides an in-depth summary of all account security-related behavior to the account administrator. This area allows you to view information about users’ most recent login and logout times, the device from which they did so, and their session IP address. The record also shows risky occurrences like unsuccessful login attempts, file downloads, board data exports, etc. This enables administrators to maintain control, identify any suspect activity, and, if necessary, trigger the panic button.
- Panic Button
The Panic Button can be activated through the admin section – if the admin detects suspicious activity in the account. By activating Panic Mode, your account will momentarily be blocked, and no one will be able to access it until the admin of the account sends a request to our Customer Success team.
- Sessions Log
In the “Security” tab of the Admin section, you can view and control the sessions of your account members. The sessions are grouped by user and show their entire session history.
In the event that there are any security concerns with a user or a user’s session, the admin can sign out account members right from the Sessions Log. Additionally, from this section, the admin can also select “Log out all account users” on the top right of the screen to instantly log out everyone from your account.
- Session Duration
In the “Advanced” section of your Admin “Security” tab, you can set a Session Duration. Here, you can either set an automatic logout after a certain amount of inactive time has passed for a user, or an automatic log-out for all users after a certain amount of time even if they have been active on the platform.
- General Security
- To review our contract with you, please see our Terms of Service.
- For more information on how we keep your data secure, please review our Enterprise Security & Confidentiality.
For further questions, please visit our Knowledge Center. To view the Knowledge Center, click the Home Page icon the top right of your page, then select “Support” and make you way to “Help Center” in the bottom left. If you have additional questions, please feel free to contact our team by selecting the blue “Contact Us” button.
- Two-Factor Authentication