To help you maintain control over your users and accessability, iPoint offers several security features.
Permission Sets – This area allows you to contol the access each user has within the various modules. You can provide access to view a proposal or sales order, but no ability to modify. These permission sets can be duplicated and modified to accomodate one or multiple users.
Require Device Authorization – This function forces approval of the different devices each user connects to iPoint. That means that when a user logs in with a new device, a system administrator will need to enter their user name and password in order to allow the new device. This can be turned on by a System Administrator in Settings>Company Info.
Authorized Devices – Within each user, the System Administrator has even more control over the devices being used to access iPoint. If you would like to restrict access to a device a user had previously connected to iPoint, simply navigate to that User in Settings, then Devices. Uncheck the Authorized box to remove access from that device.
Administrator Contolled User Names & Passwords – If you choose to do so, only System Administrators can modify user names and passwords for users in iPoint. Additionally, these passwords can now contain special characters – the only thing you’ll need to do is find a way to remember your password!
What else is available?
Two Factor Authentication (2FA) is available now! Your System Administrator simply activates 2FA, then decides how often the team should be logging in using 2FA. Then, when you log into iPoint, an email will be sent to the email account listed in iPoint with a six digit code that you’ll need to enter.
It’s simple to turn on – Settings>Module Settings>Beta>Other. Check the box to enable and decide how often 2FA needs to happen. Zero means every time you log in, you’ll need to use 2FA! Be sure to verify Settings>Users> and confirm all email addresses are correct as well.
At iPoint, we understand how extremely important protecting you and your clients information is. We will always put security first.