Secure Your Documents with Advanced Security and Authentication
infoRouter provides a comprehensive suite of security features to safeguard your digital assets. From access control to advanced authentication options, infoRouter ensures that your documents are protected, and only authorized users can access or modify files. This page outlines the various security mechanisms and authentication options infoRouter offers to help your organization maintain data integrity, compliance, and efficient collaboration.
Access Control and Permissions
To access secure resources in infoRouter, all users must have a valid account. These accounts are created by the System Administrator and stored in the security database, providing unique identification within the system. Once authenticated, users can perform actions such as checking documents in and out, participating in workflows, and being assigned tasks. Access rights are determined based on document and folder security settings.
Users can be organized into groups for collaboration and may have roles such as Library Managers or Policy Managers, enabling them to manage security permissions, oversee content, and ensure adherence to organizational policies. These features empower users to manage tasks securely while maintaining a high degree of flexibility and collaboration.
Role and Group-Based Security
In addition to user based security, infoRouter uses role-based and group-based security to allow or restrict access to documents:
Role-Based Security
- Administrator
- Library Managers
- Policy Managers
- User Managers
- Document Owners
Group-Based Security
- Users, Global User Groups, Local User Groups (Document Library based groups).
- Groups are assigned specific security permissions for folders and documents.
- Supports security inheritance to apply permissions consistently across documents.
Folder and Document Permissions
Permissions for folders and documents can be set using incremental rights:
- No Access
- List
- Read
- Add
- Add & Read
- Change
- Full Control
- Conflicting rights are resolved based on C3 Security rules.
- Support for HTTPS - Secure Socket Layers (SSL).
- Secure off-site access for remote workers, customers, and partners.
Comprehensive Audit Trails
infoRouter offers extensive audit trails, providing a log of all user activities at both the document and folder levels. These logs track actions such as document viewings, check-ins, check-outs, version deletions, and security updates, helping to ensure compliance and data integrity.
Flexible Authentication Options:
infoRouter supports various authentication methods to suit your organization's needs. Authentication logging captures all login attempts and access events, providing accountability and tracking for system usage.
- Built-in security database
- Windows Authentication
- LDAP and Active Directory
Active Directory users and groups can be imported and synchronized, allowing seamless integration with your existing security setup. For more details, learn about infoRouter LDAP Integration.