Check out our free On-Demand Network Administration Training Series


This article will discuss the topic of Security Settings, what each setting means, and how to configure them.


In order to be able to access Security Settings, a User must have access to the Admin Panel.


Security Settings can be accessed via the Admin Panel, by clicking the “Security Settings” link.

The Security Settings page contains various sections, from a list of Security Events, to User and Password Settings.


The Security Events listview displays all Security Events that have been logged for the Network. This listview contains information such as the name of the User that triggered the event, the date and time that the event was triggered, and the type of Security Event that was triggered.

Further down the page are the other Security Setting sections.


The first section displays “Account/Event Monitoring” settings. 

The first several fields in this section display the various monitored Security Events. When enabled, Collaborate will automatically monitor for these events and block Users after hitting the specified thresholds. These thresholds can be modified as needed.

The “Show CAPTCHA after incorrect login attempts” functionality can be turned on or off here. This setting  determines whether or not CAPTCHA appears after a User has failed to log in too many times in a row.

The “Show Session Timeout Warning?” setting can be turned on or off here as well. This setting determines whether or not Users will see a Session Timeout Warning when leaving a window of Collaborate open and idle for a set period of time. This set period of time is configured a little further down on this same page.

The “Logout Redirect” setting can be turned on or off here as well. This setting determines whether or not a User is redirected to the Login Screen when their sessions times out. If this setting is off, the User can log into the same screen they were on when their session timed out. If this setting is on, the User will be redirected to the main login screen and will be sent to the Home Page upon logging back into Collaborate.

The last setting in the Account/Event Monitoring Section is the IP Filter Mode setting. This setting can be utilized to only allow Users to access Collaborate from specific IP Addresses. For an in-depth explanation of IP Filter Mode functionality, please watch the video in this series titled “Security Settings - IP Filtering”.

After the Account/Event Monitoring Section, there is the User/Password Settings section.

The “Login Session Timeout (in Minutes)” field allows you to determine how long a User can remain idle before being automatically logged out of Collaborate.

Setting the “Automatically Disable Inactive Users” field to “Yes” will allow you to set the threshold at which User accounts will automatically be disabled due to inactivity.

Setting the “Enable Password Expiration” field to “Yes” will allow you to set the threshold at which User passwords will expire, requiring Users to reset their password after that amount of time.

Setting the “Require Unique Passwords” field to “Yes” will make it so that Users cannot use the same password as any of their previously used Passwords.

The final section on the Security Settings page is the Password Standards section. This section can be used to specify various aspects of passwords that you may want to be required when your User’s create their password.

The Minimum Length field can be used to set the minimum amount of characters required when Users create their password.

The Require Number field can be used to make it so that Users must include at least one Number in their password.

The Require Uppercase Character field can be used to make it so that Users must include at least one Uppercase Character in their password.

The Require Lowercase Character field can be used to make it so that Users must include at least one Lowercase Character in their password.

The Require Special Character field can be used to make it so that Users must include at least one Special Character in their password.


See Also:

Network Administration - Overview

Creating a Role

Creating a Sub Role

Security Settings - IP Filtering

Application Catalog

Application Catalog - Managing Services

Application Catalog - Managing Lookups

Application Catalog - Lookup Mapping

Application Catalog - Adding a New Simple Service

Application Digest

Case Logs