Managing KaseyaOne security

From the Security page within Admin Settings, you can do the following:

  • Manage the password requirements for users logging in to KaseyaOne. It's important to define a password policy that will establish a standard for creating secure passwords and protecting passwords. Refer to Apply a password policy.
  • Enable the IP Address Access List feature. This allows you to specify from which IPs users can log in to their KaseyaOne account, to block IP addresses, and ultimately protect your business from unauthorized logins. Refer to Set up IP access control.
  • Allowlist the IP addresses, including all IPv6 addresses from where you log in, to avoid allowlisting conflicts. Refer to Set up IP access control.

How to...

Apply a password policy

It's important to define a password policy that will establish a standard for creating secure passwords and protecting passwords. This allows you to protect your business from cyber criminals trying to gain access to your data. Only Master users can change the password requirements for KaseyaOne.

To apply a password policy, do the following:

  1. Navigate to the Admin Settings Security page. Refer to Security and navigation.
  2. Expand the Password policy section.
  3. Configure the following fields:
  4. Field Description

    Password Strength

    Minimum password length Enter the minimum number of characters required in the password each user sets.
    The default value is 8 characters. The value you enter must be between 8 and 64. Review the Character Requirements section for additional password requirements.
    Login Attempts
    Number of consecutive failed login attempts allowed before account disabling Enter the number of times a user can unsuccessfully attempt to log in before their account is disabled.

    NOTE  A disabled account requires the user to wait for their account to be automatically reenabled after the amount of time specified in the next field or must be reset by a user with the Master role. Refer to Reset a user's password or 2FA.

    The default value is 5 attempts. The value you enter must be 5 or higher.

    Length of time to disable account after max login failures exceeded Enter the amount of time a user must wait for their account to be automatically reenabled after their account is disabled from exceeding the failed login attempt limit specified in the previous field.
    The values you enter must be between 0 hours and 1 minute and 23 hours and 59 minutes.
  1. Click Update to save your changes.