Sharetru Custom Images_User Management _ Authentication - Hero
    User Management & Authentication

    Build User Management Policies That Work

    Enjoy the most flexible permissions system available. Limit user permissions and access on an individual level to specific folders so the wrong user never ends up getting access to confidential data.

    Explore User Management & Authentication Features

    Check out these features. We ensure the security of your data by doing all of our development in-house so you can be sure your files stay safe and sound.

    • Password Controls & SSH Keys

      Control authentication methods

      Use our platform’s integral authentication system to require password strength controls, periodic password changes to match your corporate policies and compliance, disallow password reuse for up to 10 years from when the password was last used, and invite users to choose their first password (matching your strength controls, of course). You can also strengthen login security over SFTP with SSH keys instead of risking the loss or theft of passwords.

    • Flexible Folder Permissions

      Tighten folder access by login credentials

      Enable admins to assign specific access rights to individual user accounts, authorizing users to perform specific actions. You can make permissions unique to each user, so each user is assigned a unique authentication method as well as unique rights within the system.

    • Single Sign-On Integration

      Streamline authentication

      Authentication is a breeze using OAuth or SAML 2.0 with our hybrid system. Simplify the login experience for your trusted users with one of our supported Identity Providers such as Azure AD, Okta, Duo, Auth0, OneLogin, or a different provider of your choice. You can also configure multiple IdPs if you wish, and have the system take specific actions the first time a user authenticates via SSO.

    • Customizable Account Lockout Policies

      Restrict user access

      Cut down on brute force attacks by enforcing temporary lockouts for failed logins. Adjust settings for when valid users enter incorrect passwords or when there are multiple failed attempts from the same IP address. 

    • Choose Roles Based on User

      Contain potential threats

      Simplify compliance with a cleaner audit trail by segmenting user privileges into three roles — Administrator, Team Manager, and User. Help contain intruders and keep your data secure by limiting what employees, applications, and system processes can access.

    • Multi-Factor Authentication (OTP)

      Control user authentication

      Require all users or only specific users to use MFA via OTP and allow site admins to restrict the delivery methods of One-Time Passcodes to email, SMS, or TOTP mobile apps. You can also allow users to choose the method themselves, and you can limit their choices.

    • IP Address Restrictions

      Deny by Default, Allow by Exception

      Strengthen your authentication processes for Web and SFTP users with individual or group IP address restrictions. You can whitelist the IP addresses of all users within a selected IP address range, restrict each individual user to a specific IP address, then deny all other IP addresses access to your site.

    • Automated User Suspension

      Set suspension standards

      Automatically disable a user’s authentication based on the number of days since their last login, unless you want to suspend it manually or on a scheduled future date.

    Control authentication methods

    Use our platform’s integral authentication system to require password strength controls, periodic password changes to match your corporate policies and compliance, disallow password reuse for up to 10 years from when the password was last used, and invite users to choose their first password (matching your strength controls, of course). You can also strengthen login security over SFTP with SSH keys instead of risking the loss or theft of passwords.

    Tighten folder access by login credentials

    Enable admins to assign specific access rights to individual user accounts, authorizing users to perform specific actions. You can make permissions unique to each user, so each user is assigned a unique authentication method as well as unique rights within the system.

    Streamline authentication

    Authentication is a breeze using OAuth or SAML 2.0 with our hybrid system. Simplify the login experience for your trusted users with one of our supported Identity Providers such as Azure AD, Okta, Duo, Auth0, OneLogin, or a different provider of your choice. You can also configure multiple IdPs if you wish, and have the system take specific actions the first time a user authenticates via SSO.

    Restrict user access

    Cut down on brute force attacks by enforcing temporary lockouts for failed logins. Adjust settings for when valid users enter incorrect passwords or when there are multiple failed attempts from the same IP address. 

    Contain potential threats

    Simplify compliance with a cleaner audit trail by segmenting user privileges into three roles — Administrator, Team Manager, and User. Help contain intruders and keep your data secure by limiting what employees, applications, and system processes can access.

    Control user authentication

    Require all users or only specific users to use MFA via OTP and allow site admins to restrict the delivery methods of One-Time Passcodes to email, SMS, or TOTP mobile apps. You can also allow users to choose the method themselves, and you can limit their choices.

    Deny by Default, Allow by Exception

    Strengthen your authentication processes for Web and SFTP users with individual or group IP address restrictions. You can whitelist the IP addresses of all users within a selected IP address range, restrict each individual user to a specific IP address, then deny all other IP addresses access to your site.

    Set suspension standards

    Automatically disable a user’s authentication based on the number of days since their last login, unless you want to suspend it manually or on a scheduled future date.

    Where Does OTP Fit Within MFA?

    Multi-factor authentication (MFA) reduces risk by imposing additional layers of authentication that may depend on things known only to the user. MFA not only affords you extra security – it also creates a more positive experience for your users, as they feel confident that they’re protected. One-Time Password (OTP) is among the most effective types of MFA, and its two primary methods are Time-Based One-Time Passwords and Hash-Based One-Time Passwords.

    sharetru-symbol-white

    See How It Works

    You don’t have to take our word for it. We’ve been leading the charge in secure online file sharing since the beginning, and we’d love to show you how we do it. Schedule your demo today.

    Book Your Demo