- General Information
- Contact Center Configuration Process
- Initial General Configuration
- Inbound Voice Service Configuration
- Outbound Campaign Configuration
- Email Service Configuration
- Chat Service Configuration
- Web Chat Configuration
- Users and Teams
- Forwarding and Voicemail Operation
- Agent Dashboard Metrics
- Skill Levels
- Help Screens
- Scenario Entries
- Services and Campaigns
- Services and Campaigns Overview
- Properties Tab
- Assignments Tab
- Lists Tab
- Dispositions Tab
- Activity Tab
- Numbers Tab
- Service Level Tab
- Outbound Tab
- Results Tab
- Archive Tab
- Canned Tab
- Email Tab
- Pre-defined Dispositions
- Outbound - General
- Outbound - Calling Hours
- Outbound - Dial Rules
- Outbound - DNC
- Outbound - Diagnostics
- Case & Contact Management
- Call Center Configuration
- General Settings
- Integration Accounts
- Knowledge Base
- Hours of Operation
- State Calling Hours
- Auxiliary Skills
- Language Skills
- Audio Treatments
- Shared Voice Segments
- Omni-Channel Routing
- Chat Settings
- Email Settings
- Quality Management
- 1 Security Policy
- 1.1 Screen Properties
- 1.1.1 Enable lockouts
- 1.1.2 Maximum login attempts
- 1.1.3 Reset attempt count after
- 1.1.4 Lockout duration
- 1.1.5 Password history
- 1.1.6 Expiration policy
- 1.1 Screen Properties
- Agent Desktop Helper Application
- System Requirements
- Countries, Calling Codes, and Time Zones
- Setting Up Private S3 Storage
Your system can be configured for automatic lock out of a user account after a number of unsuccessful login attempts. An account locked-out in this manner can be subsequently unlocked either manually or automatically after a configured timeout.
You can also configure the system to force your users to change their passwords after a specified number of days, prevent them from submitting previously used passwords, and automatically disable inactive accounts.
Note that your service provider may also impose some password complexity rules, such as minimum password length, mandatory use of various character groups, and exclusion of weak passwords (e.g., usernames). If any such rules are imposed, you cannot change them. You should get descriptions of these rules from your service provider and inform your personnel about them.
To configure security policy settings, select the Security Policy option from the Security menu.
The Security Policy screen properties are described as follows.
Checking this box indicates that the account lockout option is enabled.
To comply with the PCI DSS security standard, this option shall be enabled.
Maximum login attempts
This property specifies the number of consecutive unsuccessful login attempts after which the account will be locked out.
To comply with the PCI DSS security standard, set this parameter to at least six attempts.
Reset attempt count after
This property specifies the amount of time after which the counter of unsuccessful login attempts will be reset.
Lockout duration is the amount of time after which a locked-out account will be unlocked automatically. To disable auto-unlocking, set this parameter to “0” (zero), in which case, locked-out accounts can be unlocked manually only.
To comply with the PCI DSS security standard, set this parameter to at least 30 minutes.
The Password history section allows you to prevent the user from submitting a new password that is the same as any of the specified number of previous passwords that the user used.
Check against previously used passwords
To comply with the PCI DSS security standard, select the checkbox for Check against previously used passwords.
Number of previously used passwords to keep
To comply with the PCI DSS security standard, set the number to 4 (or greater).
The Expiration policy section provides control over how often users will be required to change their passwords and after how many days inactive user accounts will be disabled.
Require users to change passwords every
This parameter allows you to specify how often users will be required to change their passwords. To comply with the PCI DSS security standard, set this parameter to no more than 90 days.
Disable inactive accounts after
This parameter allows you to specify after how many days inactive user accounts will be disabled. To comply with the PCI DSS security standard, set this parameter to no more than 90 days.