From Bright Pattern Documentation
Jump to: navigation, search
(Updated via BpClonePage extension. Source page: draft:Contact-center-administrator-guide/Security/SecurityPolicy)
 
(3 intermediate revisions by 3 users not shown)
Line 1: Line 1:
<translate>= Security Policy= <!--T:1-->
+
= Security Policy=
Section ''Security Policy'' is where you may set further restrictions on the security policy for your contact center.  
+
This section allows you to configure certain security settings for your contact center. This includes setting up rules for user account lockouts after failed login attempts, defining password requirements (complexity, history, and expiration), managing automatic disabling of inactive accounts, and configuring Multifactor Authentication (MFA) to add an extra layer of security to logins.
  
Note that the settings you configure may not be weaker than what is defined by your service provider; if defined, the service provider settings are displayed next to the settings in this section. Any attempts to set a value weaker than the default service provider settings will produce a descriptive error message and is blocked.
+
Note that the settings you configure here may not be weaker than those defined by your service provider. If service provider settings exist, they are displayed alongside the configurable options in this section. Attempting to set a value weaker than the service provider's default will result in an error message and the change will be blocked.
  
<!--T:2-->
+
Your system can be configured for automatic lockout of a user account after a specified number of unsuccessful login attempts. Accounts locked out in this manner can be unlocked manually by an administrator or automatically after a configured timeout period.
Your system can be configured for automatic lock out of a user account after a number of unsuccessful login attempts. An account locked-out in this manner can be subsequently unlocked either manually or automatically after a configured timeout.
 
  
<!--T:3-->
 
 
You can also configure the system to force your users to change their passwords after a specified number of days, prevent them from submitting previously used passwords, and automatically disable inactive accounts.
 
You can also configure the system to force your users to change their passwords after a specified number of days, prevent them from submitting previously used passwords, and automatically disable inactive accounts.
  
 
Note that your service provider may also impose some password complexity rules, such as minimum password length, mandatory use of various character groups, and exclusion of weak passwords (e.g., usernames). If any such rules are imposed, you cannot change them. You should get descriptions of these rules from your service provider and inform your personnel about them.
 
Note that your service provider may also impose some password complexity rules, such as minimum password length, mandatory use of various character groups, and exclusion of weak passwords (e.g., usernames). If any such rules are imposed, you cannot change them. You should get descriptions of these rules from your service provider and inform your personnel about them.
  
<!--T:4-->
 
 
To configure security policy settings, select the '''Security Policy''' option from the ''Security'' menu.
 
To configure security policy settings, select the '''Security Policy''' option from the ''Security'' menu.
  
  
<!--T:5-->
 
 
[[File:Securitypolicy.png|800px|thumb|center|Security > Security Policy]]
 
[[File:Securitypolicy.png|800px|thumb|center|Security > Security Policy]]
  
  
== Screen Properties == <!--T:6-->
+
== Screen Properties ==
The ''Security Policy'' screen properties are described as follows.
+
The ''Security Policy'' screen properties are described below.
  
=== Enable lockouts === <!--T:7-->
+
=== Account lockout ===
 +
==== Enable lockouts ====
 
Checking this box indicates that the account lockout option is enabled.
 
Checking this box indicates that the account lockout option is enabled.
  
<!--T:8-->
 
 
To comply with the PCI DSS security standard, this option must be enabled.
 
To comply with the PCI DSS security standard, this option must be enabled.
  
=== Maximum login attempts === <!--T:9-->
+
 
 +
==== Maximum login attempts ====
 
This property specifies the number of consecutive unsuccessful login attempts after which the account will be locked out.
 
This property specifies the number of consecutive unsuccessful login attempts after which the account will be locked out.
  
<!--T:10-->
+
To comply with the PCI DSS security standard, set this value to six or greater.
To comply with the PCI DSS security standard, set this parameter to at least six attempts.
 
  
=== Reset attempt count after === <!--T:11-->
+
 
 +
==== Reset attempt count after ====
 
This property specifies the amount of time after which the counter of unsuccessful login attempts will be reset.
 
This property specifies the amount of time after which the counter of unsuccessful login attempts will be reset.
  
=== Lockout duration === <!--T:12-->
+
 
 +
==== Lockout duration ====
 
''Lockout duration'' is the amount of time after which a locked-out account will be unlocked automatically. To disable auto-unlocking, set this parameter to “0” (zero), in which case, locked-out accounts can be [[contact-center-administrator-guide/Users|unlocked manually]] only.  
 
''Lockout duration'' is the amount of time after which a locked-out account will be unlocked automatically. To disable auto-unlocking, set this parameter to “0” (zero), in which case, locked-out accounts can be [[contact-center-administrator-guide/Users|unlocked manually]] only.  
  
<!--T:13-->
 
 
To comply with the PCI DSS security standard, set this parameter to at least 30 minutes.
 
To comply with the PCI DSS security standard, set this parameter to at least 30 minutes.
 +
  
 
=== Password complexity ===
 
=== Password complexity ===
 
This section allows you to define various password complexity requirements; the settings you configure may not be weaker than what is defined by your service provider. Note that passwords can be checked against usernames and your service provider’s list of weak passwords.
 
This section allows you to define various password complexity requirements; the settings you configure may not be weaker than what is defined by your service provider. Note that passwords can be checked against usernames and your service provider’s list of weak passwords.
  
'''Notes''':
+
{{Note|
 
* Any modifications of password complexity rules at any level will immediately apply to all new attempts to set or change a password via any method (e.g., self, admin, import, APIs, auto-generation).
 
* Any modifications of password complexity rules at any level will immediately apply to all new attempts to set or change a password via any method (e.g., self, admin, import, APIs, auto-generation).
 
* Existing users will not be affected by modifications of password complexity rules until they change their passwords.
 
* Existing users will not be affected by modifications of password complexity rules until they change their passwords.
* When setting/changing passwords via user import or API, any attempt to use an invalid password will result in an error message indicating that the password does not comply with the security policy:
+
* When setting/changing passwords via user import or API, any attempt to use an invalid password will result in an error message indicating that the password does not comply with the security policy. The error message will identify the specific users whose passwords do not comply.}}
* The error message will be provided with respect to the specific users whose passwords do not comply.
+
 
 +
 
 +
==== Minimum password length ====
 +
Specify the minimum number of characters required for user passwords.
 +
 
 +
 
 +
==== Require digits and letters ====
 +
Check this box to enforce that passwords must contain both numeric digits (0-9) and alphabetic letters (a-z, A-Z).
 +
 
 +
 
 +
==== Require upper and lower case letters ====
 +
Check this box to enforce that passwords must contain both uppercase (A-Z) and lowercase (a-z) letters.
  
=== Password history === <!--T:14-->
 
The ''Password history'' section allows you to prevent the user from submitting a new password that is the same as any of the specified number of previous passwords that the user used.
 
  
==== Check against previously used passwords ==== <!--T:15-->
+
==== Require special characters ====
 +
Check this box to enforce that passwords must include at least one special character (e.g., !, @, #, $, %).
 +
 
 +
 
 +
==== Check against login and tenant name ====
 +
Check this box to prevent users from using their login name or the tenant name as part of their password.
 +
 
 +
 
 +
==== Check against weak password list ====
 +
Check this box to validate new passwords against the list of commonly used or easily guessable passwords defined by your service provider.
 +
 
 +
 
 +
===== see current list =====
 +
Click to download the weak passwords list.
 +
 
 +
 
 +
==== Password history ====
 +
The ''Password history'' section allows you to prevent the user from submitting a new password that matches any of the specified number of their previous passwords.
 +
 
 +
 
 +
==== Check against previously used passwords ====
 
To comply with the PCI DSS security standard, select the checkbox for ''Check against previously used passwords''.
 
To comply with the PCI DSS security standard, select the checkbox for ''Check against previously used passwords''.
  
==== Number of previously used passwords to keep ==== <!--T:16-->
+
 
 +
==== Number of previously used passwords to keep ====
 
To comply with the PCI DSS security standard, set the number to 4 (or greater).
 
To comply with the PCI DSS security standard, set the number to 4 (or greater).
  
=== Expiration policy === <!--T:17-->
+
 
 +
=== Expiration policy ===
 
The ''Expiration policy'' section provides control over how often users will be required to change their passwords and after how many days inactive user accounts will be disabled.
 
The ''Expiration policy'' section provides control over how often users will be required to change their passwords and after how many days inactive user accounts will be disabled.
  
==== Require users to change passwords every ==== <!--T:18-->
+
 
 +
==== Require users to change passwords every ====
 
This parameter allows you to specify how often users will be required to change their passwords. To comply with the PCI DSS security standard, set this parameter to no more than 90 days.
 
This parameter allows you to specify how often users will be required to change their passwords. To comply with the PCI DSS security standard, set this parameter to no more than 90 days.
  
==== Disable inactive accounts after ==== <!--T:19-->
+
 
 +
==== Disable inactive accounts after ====
 
This parameter allows you to specify after how many days inactive user accounts will be disabled. To comply with the PCI DSS security standard, set this parameter to no more than 90 days.
 
This parameter allows you to specify after how many days inactive user accounts will be disabled. To comply with the PCI DSS security standard, set this parameter to no more than 90 days.
 +
  
 
==== Exceptions, these user accounts will not be disabled on inactivity ====
 
==== Exceptions, these user accounts will not be disabled on inactivity ====
Line 75: Line 107:
  
  
 +
=== Multifactor authentication configuration ===
 +
Multifactor authentication (MFA) adds an extra layer of security to user logins by requiring a second form of verification in addition to the password. This section allows you to enable and configure MFA methods for some or all of your contact center users, including options for email-based One-Time Passwords (OTP), Time-based One-Time Passwords (TOTP) from authenticator apps, and the ability to trust specific browsers to reduce MFA prompts.
 +
 +
See [[Faq/MultifactorAuthentication#How_are_Multi-Factor_Authentication_Challenges_Issued.3F|How are Multi-Factor Authentication Challenges Issued?]] for an explanation of when and how users are prompted with MFA challenges.
 +
 +
[[File:MFA configuration options tenant.png|center|thumb|800x800px|MFA configuration options]]
 +
 +
==== Multifactor authentication is ====
 +
Select whether MFA is enabled for all users, or enabled for specific roles.
 +
 +
 +
==== Roles ====
 +
Specify the user roles that will be required to use MFA when the ''Enabled for specific roles'' option is selected.
 +
 +
 +
==== Enable trusting a browser as a second factor in MFA ====
 +
Check this box to allow users the option to "trust" the browser they are using, bypassing MFA prompts on subsequent logins from that same browser for the period defined by ''Limit the duration of trusting a browser to''.
 +
 +
 +
==== Limit the duration of trusting a browser to ====
 +
Set the maximum number of days (1-365, default 30) that a browser can remain trusted before the user must provide their second authentication factor.
 +
 +
 +
==== Allow using email as a second factor in MFA ====
 +
Check this box to enable the use of One-Time Passwords (OTP) sent via email as an MFA factor. Requires a [[Contact-center-administrator-guide/CallCenterConfiguration/EmailSettings|system email]] to be configured for your contact center.
 +
 +
 +
==== Email subject====
 +
Specify the subject line for the email containing the OTP code required for MFA.
 +
 +
 +
==== Email template====
 +
Define the body of the email sent with the OTP code to complete an MFA email challenge. You can customize this message using the following variables:
 +
* <code>$(TENANT_NAME)</code>: The name of the tenant.
 +
* <code>$(OTP)</code>: The one-time password that the user must provide.
 +
 +
 +
For example: <code>$(TENANT_NAME): $(OTP) is your security code, do not share your code. Verify website/app before entering the code.</code>
 +
 +
 +
==== Allow using TOTP codes as a second factor in MFA ====
 +
Check this box to allow users to use Time-based One-Time Passwords (TOTP) generated by an <nowiki>RFC 6238</nowiki>-compliant application as their second authentication factor.
 +
 +
 +
==== Grace period for initial TOTP secret setup ====
 +
Set the time limit (5 minutes to 7 days, default 24 hours) within which a user must configure their TOTP authenticator app after their account is created or TOTP is first enabled. If they fail to set it up within this period, an [[Faq/MultifactorAuthentication#How_do_I_Reset_the_TOTP_Grace_Period_for_a_User.3F|administrator must reset their TOTP configuration]].
  
  
</translate>
+
==== Grace period for TOTP secret setup after administrative reset ====
 +
Set the time limit (5 minutes to 24 hours, default 24 hours) within which a user must reconfigure their TOTP authenticator app after an [[Contact-center-administrator-guide/UsersandTeams/Users#TOTP|administrator has reset their existing TOTP secret]]. If they fail to set it up within this period, the administrator [[Faq/MultifactorAuthentication#How_do_I_Reset_the_TOTP_Grace_Period_for_a_User.3F|must reset it again]].

Latest revision as of 00:14, 7 May 2025

• 日本語
• 5.19 • 5.3 • 5.8

Security Policy

This section allows you to configure certain security settings for your contact center. This includes setting up rules for user account lockouts after failed login attempts, defining password requirements (complexity, history, and expiration), managing automatic disabling of inactive accounts, and configuring Multifactor Authentication (MFA) to add an extra layer of security to logins.

Note that the settings you configure here may not be weaker than those defined by your service provider. If service provider settings exist, they are displayed alongside the configurable options in this section. Attempting to set a value weaker than the service provider's default will result in an error message and the change will be blocked.

Your system can be configured for automatic lockout of a user account after a specified number of unsuccessful login attempts. Accounts locked out in this manner can be unlocked manually by an administrator or automatically after a configured timeout period.

You can also configure the system to force your users to change their passwords after a specified number of days, prevent them from submitting previously used passwords, and automatically disable inactive accounts.

Note that your service provider may also impose some password complexity rules, such as minimum password length, mandatory use of various character groups, and exclusion of weak passwords (e.g., usernames). If any such rules are imposed, you cannot change them. You should get descriptions of these rules from your service provider and inform your personnel about them.

To configure security policy settings, select the Security Policy option from the Security menu.


Security > Security Policy


Screen Properties

The Security Policy screen properties are described below.

Account lockout

Enable lockouts

Checking this box indicates that the account lockout option is enabled.

To comply with the PCI DSS security standard, this option must be enabled.


Maximum login attempts

This property specifies the number of consecutive unsuccessful login attempts after which the account will be locked out.

To comply with the PCI DSS security standard, set this value to six or greater.


Reset attempt count after

This property specifies the amount of time after which the counter of unsuccessful login attempts will be reset.


Lockout duration

Lockout duration is the amount of time after which a locked-out account will be unlocked automatically. To disable auto-unlocking, set this parameter to “0” (zero), in which case, locked-out accounts can be unlocked manually only.

To comply with the PCI DSS security standard, set this parameter to at least 30 minutes.


Password complexity

This section allows you to define various password complexity requirements; the settings you configure may not be weaker than what is defined by your service provider. Note that passwords can be checked against usernames and your service provider’s list of weak passwords.


Info.40x40.png
  • Any modifications of password complexity rules at any level will immediately apply to all new attempts to set or change a password via any method (e.g., self, admin, import, APIs, auto-generation).
  • Existing users will not be affected by modifications of password complexity rules until they change their passwords.
  • When setting/changing passwords via user import or API, any attempt to use an invalid password will result in an error message indicating that the password does not comply with the security policy. The error message will identify the specific users whose passwords do not comply.



Minimum password length

Specify the minimum number of characters required for user passwords.


Require digits and letters

Check this box to enforce that passwords must contain both numeric digits (0-9) and alphabetic letters (a-z, A-Z).


Require upper and lower case letters

Check this box to enforce that passwords must contain both uppercase (A-Z) and lowercase (a-z) letters.


Require special characters

Check this box to enforce that passwords must include at least one special character (e.g., !, @, #, $, %).


Check against login and tenant name

Check this box to prevent users from using their login name or the tenant name as part of their password.


Check against weak password list

Check this box to validate new passwords against the list of commonly used or easily guessable passwords defined by your service provider.


see current list

Click to download the weak passwords list.


Password history

The Password history section allows you to prevent the user from submitting a new password that matches any of the specified number of their previous passwords.


Check against previously used passwords

To comply with the PCI DSS security standard, select the checkbox for Check against previously used passwords.


Number of previously used passwords to keep

To comply with the PCI DSS security standard, set the number to 4 (or greater).


Expiration policy

The Expiration policy section provides control over how often users will be required to change their passwords and after how many days inactive user accounts will be disabled.


Require users to change passwords every

This parameter allows you to specify how often users will be required to change their passwords. To comply with the PCI DSS security standard, set this parameter to no more than 90 days.


Disable inactive accounts after

This parameter allows you to specify after how many days inactive user accounts will be disabled. To comply with the PCI DSS security standard, set this parameter to no more than 90 days.


Exceptions, these user accounts will not be disabled on inactivity

This parameter allows you to define the Contact Center Administrator application users that will be exempt from being disabled on inactivity. Note that API users will no longer be disabled due to inactivity (i.e., API usage now counts as account activity).


Multifactor authentication configuration

Multifactor authentication (MFA) adds an extra layer of security to user logins by requiring a second form of verification in addition to the password. This section allows you to enable and configure MFA methods for some or all of your contact center users, including options for email-based One-Time Passwords (OTP), Time-based One-Time Passwords (TOTP) from authenticator apps, and the ability to trust specific browsers to reduce MFA prompts.

See How are Multi-Factor Authentication Challenges Issued? for an explanation of when and how users are prompted with MFA challenges.

MFA configuration options

Multifactor authentication is

Select whether MFA is enabled for all users, or enabled for specific roles.


Roles

Specify the user roles that will be required to use MFA when the Enabled for specific roles option is selected.


Enable trusting a browser as a second factor in MFA

Check this box to allow users the option to "trust" the browser they are using, bypassing MFA prompts on subsequent logins from that same browser for the period defined by Limit the duration of trusting a browser to.


Limit the duration of trusting a browser to

Set the maximum number of days (1-365, default 30) that a browser can remain trusted before the user must provide their second authentication factor.


Allow using email as a second factor in MFA

Check this box to enable the use of One-Time Passwords (OTP) sent via email as an MFA factor. Requires a system email to be configured for your contact center.


Email subject

Specify the subject line for the email containing the OTP code required for MFA.


Email template

Define the body of the email sent with the OTP code to complete an MFA email challenge. You can customize this message using the following variables:

  • $(TENANT_NAME): The name of the tenant.
  • $(OTP): The one-time password that the user must provide.


For example: $(TENANT_NAME): $(OTP) is your security code, do not share your code. Verify website/app before entering the code.


Allow using TOTP codes as a second factor in MFA

Check this box to allow users to use Time-based One-Time Passwords (TOTP) generated by an RFC 6238-compliant application as their second authentication factor.


Grace period for initial TOTP secret setup

Set the time limit (5 minutes to 7 days, default 24 hours) within which a user must configure their TOTP authenticator app after their account is created or TOTP is first enabled. If they fail to set it up within this period, an administrator must reset their TOTP configuration.


Grace period for TOTP secret setup after administrative reset

Set the time limit (5 minutes to 24 hours, default 24 hours) within which a user must reconfigure their TOTP authenticator app after an administrator has reset their existing TOTP secret. If they fail to set it up within this period, the administrator must reset it again.

< Previous | Next >