Sharetru Custom Images_User Mana
    User Management & Authentication

    User Management Policies That Work

    Enjoy the most flexible permissions system available. Limit user permissions and access on an individual level to specific folders so the wrong user never ends up getting access to confidential data.

    User Authentication & Permissions Features Tour

     

    Navigate the Seas of Identity
    Verification & User Access

    Sail smoothly with our robust authentication features that go far beyond passwords.
    From two-factor authentication to Single Sign-On integration, choose the right tools to verify identities and safeguard your digital domain.

    • Password Controls & SSH Keys

      Control authentication methods

      Make a compelling statement and up your security game by enabling integral password controls. Control access user-by-user by fortifying passwords to company or industry standards, or soar to new security heights using SSH keys for automated protocols. Our platform ensures that your users' sensitive information remains safe from prying eyes. Join us on this journey, choose our platform, and rest easy knowing that your authentication systems are in safe hands.

    • Flexible Folder Permissions

      Tighten folder access by login credentials

      Picture a fortress where every individual can only access the designated areas they have been granted permission for, while restrictions within those areas ensure that they can only perform certain actions. Through flexible folder permissions, you grant access only to those who need it while minimizing the risk of accidental or intentional breaches. You have the power to finely tune the actions that users can perform, whether it's read, write, delete, or even just seeing the file names. This level of granularity lets you maintain control over your data, ensuring that it remains protected while in use.

    • Single Sign-On Integration

      Streamline authentication

      Streamline the login experience for your trusted users by leveraging the power of OAuth or SAML 2.0. Choose the authentication method that suits you best. And the best part? We've got you covered with a wide range of supported Identity Providers. Whether you prefer Azure AD, Okta, Duo, Auth0, OneLogin, or any other provider.

       

      We give you the flexibility to configure multiple Identity Providers if that's what floats your boat. Customize your authentication experience to match your unique needs, all from within our system.

    • Customizable Account Lockout Policies

      Restrict user access

      In the ever-evolving world of security, account lockout policies by username and/or IP address are an absolute game-changer. These policies act as your digital knight, ensuring that malicious actors cannot breach your defenses.

      By implementing account lockout policies by username and/or IP address, you can effectively create an impenetrable forcefield around your digital fortress by setting thresholds for failed login attempts, thwart brute force attacks, and protect against unauthorized access attempts, keeping your precious data safe from harm.

    • Choose Roles Based on User

      Contain potential threats

      Simplify compliance with a cleaner audit trail by segmenting user privileges into three roles — Administrator, Team Manager, and User. Help contain intruders and keep your data secure by limiting what employees, applications, and system processes can access.

    • Multi-Factor Authentication (OTP)

      Control user authentication

      By empowering your team with the security measures of MFA, you're taking an active approach to protect your company's digital kingdom. Whether it's enforcing OTP delivery methods or allowing user autonomy to choose their favored digital tribe – you've got the power to take the reins. So, go ahead, make your move! Tailor your security strategy with MFA-enabled OTPs and secure your digital fortress.

    • IP Address Restrictions

      Deny by Default, Allow by Exception

      You have a digital fortress guarding your valuable data, and you want to ensure that only trusted allies can pass through its gates. Enter IP address restrictions by IP range and protocol - the security feature you absolutely can't afford to ignore.

       

      IP address restrictions provide you with an iron-clad defense by allowing you to specify which IP ranges individuals can use to access your digital kingdom. This means that only users coming from predetermined IP addresses or IP ranges can enter your domain, while the rest are kept at bay. It's like having a guard at the city gates, meticulously checking passports and only allowing the chosen few inside.

    • Automated User Suspension

      Set suspension standards

      Imagine having the power to effortlessly suspend inactive users, or swiftly disable accounts with a simple click. This dynamic security feature allows you to maintain control over user access and protect your digital domain from potential threats.

       

      By automatically suspending users for inactivity, you can proactively safeguard your system by preventing dormant accounts from being exploited. With the ability to disable accounts in an instant, you hold the key to swiftly respond to security incidents, remove access privileges, and neutralize any potential breaches

    • Dual Authorization

      Fortified Security with Approvals

      Through Dual Authorization, we dramatically minimize security breaches. This powerful feature requires two administrators to validate new user enrollment— doubling the checkpoints, validating users' authenticity, and increasing the trust within your system. It's not just about safeguarding data— it's about retaining your business' credibility and your users' trust. Because we understand, security isn't a privilege, it's a must.

    Control authentication methods

    Make a compelling statement and up your security game by enabling integral password controls. Control access user-by-user by fortifying passwords to company or industry standards, or soar to new security heights using SSH keys for automated protocols. Our platform ensures that your users' sensitive information remains safe from prying eyes. Join us on this journey, choose our platform, and rest easy knowing that your authentication systems are in safe hands.

    Tighten folder access by login credentials

    Picture a fortress where every individual can only access the designated areas they have been granted permission for, while restrictions within those areas ensure that they can only perform certain actions. Through flexible folder permissions, you grant access only to those who need it while minimizing the risk of accidental or intentional breaches. You have the power to finely tune the actions that users can perform, whether it's read, write, delete, or even just seeing the file names. This level of granularity lets you maintain control over your data, ensuring that it remains protected while in use.

    Streamline authentication

    Streamline the login experience for your trusted users by leveraging the power of OAuth or SAML 2.0. Choose the authentication method that suits you best. And the best part? We've got you covered with a wide range of supported Identity Providers. Whether you prefer Azure AD, Okta, Duo, Auth0, OneLogin, or any other provider.

     

    We give you the flexibility to configure multiple Identity Providers if that's what floats your boat. Customize your authentication experience to match your unique needs, all from within our system.

    Restrict user access

    In the ever-evolving world of security, account lockout policies by username and/or IP address are an absolute game-changer. These policies act as your digital knight, ensuring that malicious actors cannot breach your defenses.

    By implementing account lockout policies by username and/or IP address, you can effectively create an impenetrable forcefield around your digital fortress by setting thresholds for failed login attempts, thwart brute force attacks, and protect against unauthorized access attempts, keeping your precious data safe from harm.

    Contain potential threats

    Simplify compliance with a cleaner audit trail by segmenting user privileges into three roles — Administrator, Team Manager, and User. Help contain intruders and keep your data secure by limiting what employees, applications, and system processes can access.

    Control user authentication

    By empowering your team with the security measures of MFA, you're taking an active approach to protect your company's digital kingdom. Whether it's enforcing OTP delivery methods or allowing user autonomy to choose their favored digital tribe – you've got the power to take the reins. So, go ahead, make your move! Tailor your security strategy with MFA-enabled OTPs and secure your digital fortress.

    Deny by Default, Allow by Exception

    You have a digital fortress guarding your valuable data, and you want to ensure that only trusted allies can pass through its gates. Enter IP address restrictions by IP range and protocol - the security feature you absolutely can't afford to ignore.

     

    IP address restrictions provide you with an iron-clad defense by allowing you to specify which IP ranges individuals can use to access your digital kingdom. This means that only users coming from predetermined IP addresses or IP ranges can enter your domain, while the rest are kept at bay. It's like having a guard at the city gates, meticulously checking passports and only allowing the chosen few inside.

    Set suspension standards

    Imagine having the power to effortlessly suspend inactive users, or swiftly disable accounts with a simple click. This dynamic security feature allows you to maintain control over user access and protect your digital domain from potential threats.

     

    By automatically suspending users for inactivity, you can proactively safeguard your system by preventing dormant accounts from being exploited. With the ability to disable accounts in an instant, you hold the key to swiftly respond to security incidents, remove access privileges, and neutralize any potential breaches

    Fortified Security with Approvals

    Through Dual Authorization, we dramatically minimize security breaches. This powerful feature requires two administrators to validate new user enrollment— doubling the checkpoints, validating users' authenticity, and increasing the trust within your system. It's not just about safeguarding data— it's about retaining your business' credibility and your users' trust. Because we understand, security isn't a privilege, it's a must.

    OTP Integration Built In

    OTP, or One-Time Password, plays a crucial role in Multi-Factor Authentication (MFA) by providing an additional layer of security. As a time-sensitive password that can only be used once, OTP adds an extra level of protection against unauthorized access. This important security functionality ensures that even if an attacker somehow manages to obtain a user's password, they still require a unique OTP to gain entry, significantly reducing the risk of account compromise.

    sharetru-symbol-white

    See How It Works

    You don’t have to take our word for it. We’ve been leading the charge in secure online file sharing since the beginning, and we’d love to show you how we do it. Schedule your demo today.

    Book Your Demo