SlideShare a Scribd company logo
1 of 12
Download to read offline
SECURITY SYSTEMS
Introduction
Storing confidential documents is important.
It is even MORE important to know that
these documents are always protected and
available to the designed users.
With LogicalDOC, the Admin will take control
over the security settings and decide how to
protect his documentation.
The software has a lot of options that will
customise the experience of every single
user: it will be possible to create a secure
You can store the documents and
LogicalDOC repositories wherever you want
and be able to access to them in the easiest
way possible! Just open your browser, insert
the URL where you installed LogicalDOC
and access to your version of LogicalDOC
document Management System.
You donโ€™t want that uninvited users access
with your credentials? Just unflag the case
โ€œremember meโ€ and you will be sure that the
browser will not save your username.
Access to your documents in a fast and secure way
SECURITY SISTEMS PG 1
1
connection for anonymous users, manage
the security settings of specific
documentation of folders, create reports for
the most important updates and many other
features that will allow a secure access to
your documents.
For this reason, we created a small
presentation that will show you all the
possibilities that a software like LogicalDOC
has to offer. Enjoy it!
As an administrator, you can change the security settings every time you need.
You can manage, for example, the expiration date of your password: choose the
maximum duration allowed before the system notifies the users and forces it to
change the password. In this way you will always be sure that the userโ€™s access is
secured.
You can also manage a lot of other settings related to the password, such as the
minimum length, the possibility to save the user credentials in the browser or the
option to redirect HTTP requests to HTTPS secure protocols.
Help your users and remind them when to change
the password for a more secure connection
SECURITY SISTEMS PG 2
2
Create a secure connection for anonymous users
and choose what they can visualize at any moment3
Sometimes you want to share non-confidential material with one of your partners
but you donโ€™t want to create a new user for it. LogicalDOC gives you the
opportunity to grant access to anonymous users without passing through the login
page.
Once you enable it, you will be able to share an URL: when someone access to
this URL, it will be automatically logged in as an anonymous user.
SECURITY SISTEMS PG 3
3
With a few clicks of your mouse you are going to be able to choose who can
access specific documentations or folders, thanks to the User and Groups
management system.
At any given moment you can add a new user by filling in the minimum required
information (such as Username, email address, First name, last name, language
and Group) and assign to it the right permissions.
If you want to manage the access in the easiest way possible, you can create
different groups with specific accesses and avoid to lose your time assign access
to users, one-by-one.
Using the Quota feature, you will always be able to control how much data a user
can upload in the system.
Choose whoโ€™s going to be able to visualize
specific documentations or folders 4
Give special access to a specific folder for
the most important documentation5
Whenever you are working on a restricted authorized project, you can always
insert all the documentation in a folder and change the security policies of the
same. By going in the Security Tab of the folder, you will able to control the
actions that can be executed by specific users or groups.
SECURITY SISTEMS PG 4
3
5
You can decide that the group XXX can only read the resources in the folder
while the group ZZZ will be also able to Delete, modify and download the
documents and files in the folder.
You created a project folder and you want to be sure to be updated every time
there is a change in one of its documents, or you want to know when a new
file is uploaded. LogicalDOC allows you to receive documentation and to
extract several reports using the Reports and Event Subscription feature.
Keep under control all the important documents
or your projects with the notification feature 6
The Event Subscription feature is perfect for
the job, because if you want to be informed
whenever a change or an update occur in the
system, you can automatically request to
receive email notifications every time a
document is modified or a document is added
to a determined folder.
Make sure that your documents are not
infected with an integrated antivirus7
You donโ€™t want to upload an infected document in your documentation
management system: Trojan and other malware could harm your company by
leaking important information. LogicalDOC works with ClamAV, an open-
source antivirus software that can check every document as soon as you start
to upload it in the system.
SECURITY SISTEMS PG 5
3
You can enable the Antivirus check at any given moment and with ClamAV
you will always be able to choose which file to check: the Antivirus is a highly
customisable tool that will make sure that your documents are safe at all time.
One of the most common ways that allow a Hacker to access a system is a Brute
Force Attack: the Hacker will try Username and password until doesnโ€™t find the
correct combination to enter.
LogicalDOC protects you from this kind of attacks: you can decide to block a
username whenever its login authentication fails a determined amount of time, or
to block an IP that tries to log in without success a certain amount of times.
Protect yourself from Hackers with LogicalDOCโ€™s
Brute force attack defensive mechanism 8
7
SECURITY SISTEMS PG 6
Ban unwanted IPs or users with
LogicalDOC integrated firewall9
You discovered that there is a suspicious user that keeps accessing through a
specific IP? LogicalDOC has a specific Firewall feature that will allow to
manage the access from specific IPs, networks and hostnames.
You can even choose to allow the access to the system only when accessing
with the IP of your office!
If you work with different clients that use ActiverDirectory and LDAP
system, LogicalDOC will be allow you to access through them after a fast
configuration.
By inserting the URL of the external authentication server, the Username, the
Password, The User Base Node and the Groups base node, you will be able to
automatically connect from other systems.
Complete compatibility with external LDAP and ActiveDirectory
authentication systems with a secure external connection 10
SECURITY SISTEMS PG 7
3
Protect entire repositories with by encrypting
your storages11
You can storage your documents in different repositories: Storages can be
created in Local folders, Remote Folders, Amazon S3 buckets and Microsoft
Azure containers.
But did you know that you can protect each and every one of them by
activating the encryption mode of the storage type you are using?
Once you activate this mode, all the documents are going to be encrypted and
you will be able to access to it only with the correct user and password.
In this way, if someone is able to replicate and transfer information from the
storage, it will not able to read it without the credentials.
Protect each document with a customized
password 12
SECURITY SISTEMS PG 8
Whenever you need to keep secret a confidential document and you want to
share it with a limited number of people, you will be able to protect it at any time
with a password.
Click on the document and set a password with a few clicks.
Please notice - give the password to a limited number of users: accessing the
document doesnโ€™t require extra credential.
12
Want to be twice as safer while storing and monitoring
your documents? Use two factor authentication tools13
Username and password are the most common way to log in in a website or a
software, but they are not always the safest way to protect your sensible data:
for this reason it was invented the 2FA, which is an extra level of security that
you can add when authenticating.
But how does it works? After you insert your username and password, the
system normally requires an extra step: this one could be an SMS to your
phone, or to plug in a device that could be recognised by the software.
LogicalDOC found a solution that will allow you to protect your file with this
technology thanks to the new support with Google Authenticator and Yubico.
In the Tab Administration you can click on the dropbox list Security, then Two
Factors Authentication.
At this point it is possible to select if you want to enable Google Authenticator
or Yubikey.
SECURITY SISTEMS PG 9
13
Once you select one of your preferences, the log in screen it should requires
an extra information that you can obtain following the 2FA procedure.
SECURITY SISTEMS PG 9
14
Single Sign-on is definitely an extremely convenient feature for any
LogicalDOC user!
The Central Authentication Service (CAS) is the most used single sign-on
protocol for the web. It's purpose is to permit a user to access multiple
applications while providing their credentials (such as userid and password)
only once.
It also allows web applications to authenticate users without gaining access to
a user's security credentials, such as a password. The name CAS also refers
to a software package that implements this protocol.
The convenience of single sign-on in total
security
Head Quarters
LogicalDOC
14-25 Plaza Road
Suite N-3-5
Fair Lawn, NJ 07410
USA
+1 (800) 654 2827
sales@logicaldoc.com
USA and Canada
Europe Quarters
LogicalDOC Srl
via Aldo Moro interna, 3
41012, Carpi
Italy
+39 059 5970906
+39 059 640508
info@logicaldoc.com
Worldwide
German Contact
INDUS-VBS GmbH
Bitzenhofer Weg, 3b
86453 Dasing
Germany
+49 8205 969992
Germany and Austria
FIND Us!!

More Related Content

What's hot

Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
Microsoft Private Cloud
ย 

What's hot (20)

Sicurezza in LogicalDOC
Sicurezza in LogicalDOCSicurezza in LogicalDOC
Sicurezza in LogicalDOC
ย 
10 steps to implement edms
10 steps to implement edms10 steps to implement edms
10 steps to implement edms
ย 
LogicalDOC il Sistema di Gestione Documentale pratico e conveniente
LogicalDOC il Sistema di Gestione Documentale pratico e convenienteLogicalDOC il Sistema di Gestione Documentale pratico e conveniente
LogicalDOC il Sistema di Gestione Documentale pratico e conveniente
ย 
Document Management System Overview
Document Management System OverviewDocument Management System Overview
Document Management System Overview
ย 
kafka
kafkakafka
kafka
ย 
How To Install and Configure SNMP on RHEL 7 or CentOS 7
How To Install and Configure SNMP on RHEL 7 or CentOS 7How To Install and Configure SNMP on RHEL 7 or CentOS 7
How To Install and Configure SNMP on RHEL 7 or CentOS 7
ย 
Introducing Microsoft 365 for Business
Introducing Microsoft 365 for BusinessIntroducing Microsoft 365 for Business
Introducing Microsoft 365 for Business
ย 
Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
ย 
Deep Dive on Amazon Aurora
Deep Dive on Amazon AuroraDeep Dive on Amazon Aurora
Deep Dive on Amazon Aurora
ย 
Everything You Need to Know About HCL Notes 14
Everything You Need to Know About HCL Notes 14Everything You Need to Know About HCL Notes 14
Everything You Need to Know About HCL Notes 14
ย 
Kafka internals
Kafka internalsKafka internals
Kafka internals
ย 
Databricks Delta Lake and Its Benefits
Databricks Delta Lake and Its BenefitsDatabricks Delta Lake and Its Benefits
Databricks Delta Lake and Its Benefits
ย 
Fast Start Failover DataGuard
Fast Start Failover DataGuardFast Start Failover DataGuard
Fast Start Failover DataGuard
ย 
The Art of Monitoring (2016).pdf
The Art of Monitoring (2016).pdfThe Art of Monitoring (2016).pdf
The Art of Monitoring (2016).pdf
ย 
Monitoring Oracle Database Instances with Zabbix
Monitoring Oracle Database Instances with ZabbixMonitoring Oracle Database Instances with Zabbix
Monitoring Oracle Database Instances with Zabbix
ย 
Document management system
Document management systemDocument management system
Document management system
ย 
Sizing Your MongoDB Cluster
Sizing Your MongoDB ClusterSizing Your MongoDB Cluster
Sizing Your MongoDB Cluster
ย 
Introduction to the Disruptor
Introduction to the DisruptorIntroduction to the Disruptor
Introduction to the Disruptor
ย 
Kafka pub sub demo
Kafka pub sub demoKafka pub sub demo
Kafka pub sub demo
ย 
NetAppOverview
NetAppOverviewNetAppOverview
NetAppOverview
ย 

Similar to LogicalDOC Security Systems

IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical Whitepaper
Jim Kitchen
ย 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
BoxHQ
ย 
Chapter 09
Chapter 09Chapter 09
Chapter 09
cclay3
ย 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
Nag Nani
ย 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
Phillip Stalnaker
ย 
Mona final review
Mona final reviewMona final review
Mona final review
sudheer kumar
ย 

Similar to LogicalDOC Security Systems (20)

IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical Whitepaper
ย 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
ย 
Chapter 09
Chapter 09Chapter 09
Chapter 09
ย 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016
ย 
8 isecurity database
8 isecurity database8 isecurity database
8 isecurity database
ย 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
ย 
DoChronicle
DoChronicleDoChronicle
DoChronicle
ย 
Document Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxDocument Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptx
ย 
Presentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini AnandPresentation On CLoudSweeper By Harini Anand
Presentation On CLoudSweeper By Harini Anand
ย 
Zyncro security
Zyncro securityZyncro security
Zyncro security
ย 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
ย 
A Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access ControlA Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access Control
ย 
Securing Source Code on Endpoints
Securing Source Code on EndpointsSecuring Source Code on Endpoints
Securing Source Code on Endpoints
ย 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
ย 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
ย 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdf
ย 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
ย 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
ย 
Mona final review
Mona final reviewMona final review
Mona final review
ย 
LogicalDOC Flyer
LogicalDOC FlyerLogicalDOC Flyer
LogicalDOC Flyer
ย 

Recently uploaded

CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female serviceCALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
anilsa9823
ย 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
bodapatigopi8531
ย 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
ย 

Recently uploaded (20)

Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanโ€™s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanโ€™s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanโ€™s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlanโ€™s ...
ย 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
ย 
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female serviceCALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Badshah Nagar Lucknow best Female service
ย 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
ย 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
ย 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
ย 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
ย 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
ย 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
ย 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
ย 
Vip Call Girls Noida โžก๏ธ Delhi โžก๏ธ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida โžก๏ธ Delhi โžก๏ธ 9999965857 No Advance 24HRS LiveVip Call Girls Noida โžก๏ธ Delhi โžก๏ธ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida โžก๏ธ Delhi โžก๏ธ 9999965857 No Advance 24HRS Live
ย 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
ย 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
ย 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
ย 
Shapes for Sharing between Graph Data Spacesย - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spacesย - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spacesย - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spacesย - and Epistemic Querying of RDF-...
ย 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
ย 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
ย 
call girls in Vaishali (Ghaziabad) ๐Ÿ” >เผ’8448380779 ๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธ
call girls in Vaishali (Ghaziabad) ๐Ÿ” >เผ’8448380779 ๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธcall girls in Vaishali (Ghaziabad) ๐Ÿ” >เผ’8448380779 ๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธ
call girls in Vaishali (Ghaziabad) ๐Ÿ” >เผ’8448380779 ๐Ÿ” genuine Escort Service ๐Ÿ”โœ”๏ธโœ”๏ธ
ย 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
ย 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
ย 

LogicalDOC Security Systems

  • 2. Introduction Storing confidential documents is important. It is even MORE important to know that these documents are always protected and available to the designed users. With LogicalDOC, the Admin will take control over the security settings and decide how to protect his documentation. The software has a lot of options that will customise the experience of every single user: it will be possible to create a secure You can store the documents and LogicalDOC repositories wherever you want and be able to access to them in the easiest way possible! Just open your browser, insert the URL where you installed LogicalDOC and access to your version of LogicalDOC document Management System. You donโ€™t want that uninvited users access with your credentials? Just unflag the case โ€œremember meโ€ and you will be sure that the browser will not save your username. Access to your documents in a fast and secure way SECURITY SISTEMS PG 1 1 connection for anonymous users, manage the security settings of specific documentation of folders, create reports for the most important updates and many other features that will allow a secure access to your documents. For this reason, we created a small presentation that will show you all the possibilities that a software like LogicalDOC has to offer. Enjoy it!
  • 3. As an administrator, you can change the security settings every time you need. You can manage, for example, the expiration date of your password: choose the maximum duration allowed before the system notifies the users and forces it to change the password. In this way you will always be sure that the userโ€™s access is secured. You can also manage a lot of other settings related to the password, such as the minimum length, the possibility to save the user credentials in the browser or the option to redirect HTTP requests to HTTPS secure protocols. Help your users and remind them when to change the password for a more secure connection SECURITY SISTEMS PG 2 2 Create a secure connection for anonymous users and choose what they can visualize at any moment3 Sometimes you want to share non-confidential material with one of your partners but you donโ€™t want to create a new user for it. LogicalDOC gives you the opportunity to grant access to anonymous users without passing through the login page. Once you enable it, you will be able to share an URL: when someone access to this URL, it will be automatically logged in as an anonymous user.
  • 4. SECURITY SISTEMS PG 3 3 With a few clicks of your mouse you are going to be able to choose who can access specific documentations or folders, thanks to the User and Groups management system. At any given moment you can add a new user by filling in the minimum required information (such as Username, email address, First name, last name, language and Group) and assign to it the right permissions. If you want to manage the access in the easiest way possible, you can create different groups with specific accesses and avoid to lose your time assign access to users, one-by-one. Using the Quota feature, you will always be able to control how much data a user can upload in the system. Choose whoโ€™s going to be able to visualize specific documentations or folders 4 Give special access to a specific folder for the most important documentation5 Whenever you are working on a restricted authorized project, you can always insert all the documentation in a folder and change the security policies of the same. By going in the Security Tab of the folder, you will able to control the actions that can be executed by specific users or groups.
  • 5. SECURITY SISTEMS PG 4 3 5 You can decide that the group XXX can only read the resources in the folder while the group ZZZ will be also able to Delete, modify and download the documents and files in the folder. You created a project folder and you want to be sure to be updated every time there is a change in one of its documents, or you want to know when a new file is uploaded. LogicalDOC allows you to receive documentation and to extract several reports using the Reports and Event Subscription feature. Keep under control all the important documents or your projects with the notification feature 6 The Event Subscription feature is perfect for the job, because if you want to be informed whenever a change or an update occur in the system, you can automatically request to receive email notifications every time a document is modified or a document is added to a determined folder. Make sure that your documents are not infected with an integrated antivirus7 You donโ€™t want to upload an infected document in your documentation management system: Trojan and other malware could harm your company by leaking important information. LogicalDOC works with ClamAV, an open- source antivirus software that can check every document as soon as you start to upload it in the system.
  • 6. SECURITY SISTEMS PG 5 3 You can enable the Antivirus check at any given moment and with ClamAV you will always be able to choose which file to check: the Antivirus is a highly customisable tool that will make sure that your documents are safe at all time. One of the most common ways that allow a Hacker to access a system is a Brute Force Attack: the Hacker will try Username and password until doesnโ€™t find the correct combination to enter. LogicalDOC protects you from this kind of attacks: you can decide to block a username whenever its login authentication fails a determined amount of time, or to block an IP that tries to log in without success a certain amount of times. Protect yourself from Hackers with LogicalDOCโ€™s Brute force attack defensive mechanism 8 7
  • 7. SECURITY SISTEMS PG 6 Ban unwanted IPs or users with LogicalDOC integrated firewall9 You discovered that there is a suspicious user that keeps accessing through a specific IP? LogicalDOC has a specific Firewall feature that will allow to manage the access from specific IPs, networks and hostnames. You can even choose to allow the access to the system only when accessing with the IP of your office! If you work with different clients that use ActiverDirectory and LDAP system, LogicalDOC will be allow you to access through them after a fast configuration. By inserting the URL of the external authentication server, the Username, the Password, The User Base Node and the Groups base node, you will be able to automatically connect from other systems. Complete compatibility with external LDAP and ActiveDirectory authentication systems with a secure external connection 10
  • 8. SECURITY SISTEMS PG 7 3 Protect entire repositories with by encrypting your storages11 You can storage your documents in different repositories: Storages can be created in Local folders, Remote Folders, Amazon S3 buckets and Microsoft Azure containers. But did you know that you can protect each and every one of them by activating the encryption mode of the storage type you are using? Once you activate this mode, all the documents are going to be encrypted and you will be able to access to it only with the correct user and password. In this way, if someone is able to replicate and transfer information from the storage, it will not able to read it without the credentials. Protect each document with a customized password 12
  • 9. SECURITY SISTEMS PG 8 Whenever you need to keep secret a confidential document and you want to share it with a limited number of people, you will be able to protect it at any time with a password. Click on the document and set a password with a few clicks. Please notice - give the password to a limited number of users: accessing the document doesnโ€™t require extra credential. 12 Want to be twice as safer while storing and monitoring your documents? Use two factor authentication tools13 Username and password are the most common way to log in in a website or a software, but they are not always the safest way to protect your sensible data: for this reason it was invented the 2FA, which is an extra level of security that you can add when authenticating. But how does it works? After you insert your username and password, the system normally requires an extra step: this one could be an SMS to your phone, or to plug in a device that could be recognised by the software. LogicalDOC found a solution that will allow you to protect your file with this technology thanks to the new support with Google Authenticator and Yubico. In the Tab Administration you can click on the dropbox list Security, then Two Factors Authentication. At this point it is possible to select if you want to enable Google Authenticator or Yubikey.
  • 10. SECURITY SISTEMS PG 9 13 Once you select one of your preferences, the log in screen it should requires an extra information that you can obtain following the 2FA procedure.
  • 11. SECURITY SISTEMS PG 9 14 Single Sign-on is definitely an extremely convenient feature for any LogicalDOC user! The Central Authentication Service (CAS) is the most used single sign-on protocol for the web. It's purpose is to permit a user to access multiple applications while providing their credentials (such as userid and password) only once. It also allows web applications to authenticate users without gaining access to a user's security credentials, such as a password. The name CAS also refers to a software package that implements this protocol. The convenience of single sign-on in total security
  • 12. Head Quarters LogicalDOC 14-25 Plaza Road Suite N-3-5 Fair Lawn, NJ 07410 USA +1 (800) 654 2827 sales@logicaldoc.com USA and Canada Europe Quarters LogicalDOC Srl via Aldo Moro interna, 3 41012, Carpi Italy +39 059 5970906 +39 059 640508 info@logicaldoc.com Worldwide German Contact INDUS-VBS GmbH Bitzenhofer Weg, 3b 86453 Dasing Germany +49 8205 969992 Germany and Austria FIND Us!!