Policy
When logging in to SingleID or logging in to an application registered with SingleID, various settings such as login method, authentication session, and password must be set according to the organization’s security policy.
SingleID provides a policy management feature that allows for detailed settings for login and authentication information.
If you have purchased the anomaly detection feature (ADM), you can set it to analyze the user’s login behavior when logging in and alert the user to potential security threats when an unusual authentication is detected.
The policy features provided by SingleID are as follows:
- Login policy
- Authentication policy
- Anomaly detection policy
Using SingleID’s policy feature, you can specify a detailed login method according to who, when, and under what environment logs in to which application, creating a secure authentication environment that meets the organization’s security requirements.
Login Policy
The administrator can set a detailed policy on which authentication means can be used to authenticate when a user logs in to SingleID, and can create a conditional authentication policy for users authenticating in a specific environment if necessary.
Login policy can be configured using the following conditions:
- Which application is logging in?
- Who logs in?
- In what environment do they log in?
To access the login policy menu, navigate as follows:
- Admin Portal > Policies > Login Policy
Basic Login Policy
The Admin Portal has two default policies created as follows.
- Admin Portal Policy: Policy to control Admin Portal access rights
- Default Policy: Basic access control policy for users
The Admin Portal Policy is a login policy applied when logging in to the Admin Portal, and the Default Policy is a login policy applied when logging in to the user portal.
After integrating an application with SingleID, if no separate login policy is assigned, the Default Policy is automatically assigned as the basic login policy.
Registering a Login Policy
The login policy sets the login policy for administrators and users. You can set login policies based on access environment, application, and situation.
The login policy can be registered through a 4-step screen as follows:
- General
- Assignment
- Initial Redirection
- Rules
General
In the general screen, enter the name and description of the login policy.
The fields to be entered are as follows.
| Name | Description | Required |
|---|---|---|
| Name | Enter the name of the login policy. | Required |
| Description | Enter the description of the login policy. | Required |
Click the Next button to move to the assignment screen.
Assignment
In the assignment screen, specify the application to which the login policy will be applied.
| Name | Description |
|---|---|
| Filter | Filters applications by status. |
| Keyword Search | Searches by application name and description. |
| Detailed Search | Displays detailed search options for applications on the screen. |
| Assign Button | Displays the application assignment popup on the screen. |
| Assigned Application List | The assigned applications are displayed in a list format. The list starts empty. |
- Click the Assign button to display the application assignment popup on the screen.
- Application Assignment popup, select one or more applications to assign to the login policy and click the Assign button.
- If all applications have been assigned, click the Cancel button to close the Application Assignment popup.
Initial Redirection
The Initial Redirection screen specifies the user’s login screen entry method and login method
Redirected to SingleID’s Sign-in page (login page)
Redirected to the external IdP
The explanations for the two methods are as follows:
- If Redirected to SingleID’s Sign-in page is selected, the SingleID login page will be displayed to the user attempting to log in.
- If Redirected to the external IdP is selected, the login page of the selected Identity Provider will be displayed to the user attempting to log in.
- After selecting Redirected to the external IdP, you must select and specify the Identity Provider from the selection list.
- If Redirected to SingleID’s Sign-in page is selected, you can optionally display a button at the bottom of the SingleID login screen that allows the user to log in through an Identity Provider.
- AND see the following external IdP buttons on the Sign-In page, you can set up the login screen to display by selecting one or more Identity Providers registered with SingleID in the text input box below and clicking the mouse.
Rules
On the Rules screen, you can modify or add login rules and set the priority between login rules.
| Name | Description |
|---|---|
| Rule List | The login rules are displayed on the screen in a list format. The Default Rule is displayed by default, and the Default Rule cannot be deleted. |
| Keyword Search | Searches by the name or description of the login rule. |
| Register Button | Registers a new login rule. |
| Complete Button | Registers the login policy. |
Default Rule Setting
The login rule list on the rule screen displays the Default Rule by default.
The Default Rule cannot be deleted and can only be modified. Additionally, when one or more login rules are added, the priority cannot be set. (It is always the lowest priority.)
To modify the Default Rule, follow these steps:
- Click on the Default Rule in the rule list.
- The WHEN condition of the Default Rule cannot be modified.
- The THEN result of the Default Rule can be modified.
| Name | Description |
|---|---|
| Access Permission Setting | Sets the access permission. |
| Mandatory Authentication Method | Sets the primary login method. Additional login methods can be displayed on the login screen besides the default login method. |
| MFA Authentication | Sets additional login to be required after the primary login is successful. |
| Terms and Conditions for Collecting Consent and Terms | Sets the terms and conditions to be displayed and consent to be obtained when the user logs in to SingleID for the first time. |
| Save Button | Saves the modified login rule. |
- Deny Access
- Allow Access
If you select Deny Access, all user logins will be denied.
If you select Allow Access in the access permission setting, you can set the user’s login method.
If you selected Redirected to the external IdP as the login method on the Initial Redirection screen, the primary login setting will not be displayed on the screen.
Essential authentication methods are performed by the external Identity Provider based on the Initial Redirection settings.
To allow users to log in through multi-factor authentication, check the MFA authentication checkbox and select one or more authenticators in the text input box.
If you want to set up the terms and conditions agreement for users logging in to SingleID for the first time, check the terms and conditions agreement setting (d) checkbox and select one or more terms or conditions to be displayed on the screen in the text input box.
Add Rule
To add a login rule, follow these steps:
- Click the Register button at the top right of the rule list.
- Enter the name and description of the rule on the rule registration screen.
- Refer to the following to enter the rule items:
| Name | Description |
|---|---|
| Name | The name of the rule. |
| Description | Rule description. |
| User Group Assignment | Select the user group to which the rule will be applied. |
| Profile Attribute Assignment | Click the ‘Add’ button in the profile attribute assignment list to add attributes. For attribute descriptions and operator explanations, refer to the help below. |
| Group Settings | Specifies the group to which the logging-in user belongs. |
| User Attribute List | Specifies the attributes of the logging-in user and the conditions for each attribute. |
| Add User Attribute Button | Displays the “Add Attribute” popup on the screen. |
Access Environment
| Name | Description |
|---|---|
| Network | Specifies the IP or network range of the logging-in user. The default value is “IP address anywhere”.- Desktop- Mobile |
| Platform | Specifies the device information of the logging-in user. The default value is “Any platforms”.- Desktop- Mobile |
| Browser | Specifies the browser information of the logging-in user. The default value is “Any browsers”.- Edge- Chrome- Safari |
| OS | Specifies the OS information of the logging-in user. The default value is “Any OS”.- Windows 10- Windows 11- Android- iOS |
| AND Anomalies (Abnormal Behavior) | Sets the condition for whether an anomaly was detected during login.Anomaly detection condition setting is only possible for tenants who have purchased the Anomaly Detection Management (ADM) option.To use the anomaly detection function (ADM), you must select the additional option when signing the SingleID usage contract.If you want to use the anomaly detection function, you can make an additional purchase on the SCP product purchase page.After setting all the “WHEN” condition areas, set the login method to be used when a user who meets the conditions logs in. |
The following are the attributes of the user that can be selected.
User Attribute Information
| Attribute Name | Data Type | Required | Description |
|---|---|---|---|
| key | String | Required | Key |
| username | String | Required | ID |
| password | GuardedString | Required | Password |
| status | String | Required | Status |
| mustChangePassword | Boolean | Required | Password Forced Setting |
| suspended | Boolean | Required | Waiting Status |
| creator | String | - | Creator |
| creationDate | Date | - | Creation Date |
| lastModifier | String | - | Last Modifier |
| lastChangeDate | Date | - | Last Change Date |
| administrator | Boolean | - | Administrator |
| displayName | String | - | Display Name |
| cn | String | - | Common Name |
| local | String | - | Locale (Email Sending Standard) |
| userSource | String | - | User Source |
| syncDate | String | - | Last Sync Date |
| contractNumber | String | - | Contract Number |
| contractStartDate | String | - | Contract Start Date |
| contractEndDate | String | - | Contract End Date |
| agreementDate | String | - | Mandatory Agreement Date |
| accountStartDate | String | - | Account Usage Start Date |
| accountEndDate | String | - | Account Usage End Date |
| partnerOrganizationCode | String | - | Partner Company Code |
| approvalUser | String | - | Approval User ID |
| formattedName | String | - | Korean Display Name |
| familyName | String | - | Korean Last Name |
| givenName | String | - | Korean First Name |
| enFormattedName | String | - | English Display Name |
| enFamilyName | String | - | English Last Name |
| enGivenName | String | - | English Name |
| adDomain | String | - | AD Domain |
| nickName | String | - | Nickname |
| employeeNumber | String | - | Employee Number |
| epId | String | - | EP ID |
| String | - | Email Address | |
| phoneNumberWork | String | - | Phone Number |
| mobile | String | - | Mobile Phone Number |
| title | String | - | Title |
| enTitle | String | - | English Title |
| titleCode | String | - | Title Code |
| entitlement | String | - | Position |
| department | String | - | Department Name |
| enDepartment | String | - | English Department Name |
| departmentCode | String | - | Department Code |
| organization | String | - | Company Name |
| enOrganization | String | - | English Company Name |
| organizationCode | String | - | Company Code |
| region | String | - | Location |
| userStatus | String | - | Employee Status |
| userType | String | - | Employee Type |
| securityLevel | String | - | Security Level |
| preferredLanguage | String | - | Preferred Language |
| executiveYn | String | - | Executive Status |
| timeZone | String | - | Time Zone |
| accountLocked | Boolean | - | Account Lock |
| accountAutoLocked | Boolean | - | Account Auto Lock |
| accountDisabled | Boolean | - | Account Disabled |
| accountSuspended | Boolean | - | Dormant Account |
| accountSuspendedTime | Date | - | Dormant Account Time |
| lastLoginTime | Date | - | Last Login Time |
| accountState | String | - | Account State |
Operators are as follows.
| Operator | Description |
|---|---|
| Equals | Searches for users whose attribute value matches the condition value. |
| Not Equals | Searches for users whose attribute value does not match the condition value. |
| Starts with | Searches for users whose attribute value starts with the condition string. |
| Ends with | Searches for users whose attribute value ends with the condition string. |
| Contains | Searches for users whose attribute value contains the condition string. |
THEN Settings
THEN result area sets the login method and procedure.
In the access permission setting (a), you can select one of the following two options:
- Deny Access
- Allow Access Deny Access is selected, all user logins will be denied. (The default value of access permission setting (a) is Deny Access)
To allow users to log in and set detailed login methods, select Allow Access.
| Name | Description |
|---|---|
| Access Permission Setting | Sets the access permission. |
| Primary Login Setting | Sets the primary login method. In addition to the default login method, additional login methods can be displayed on the login screen. |
| Additional Login Setting | Sets to require additional login after the primary login is successful. |
| Terms and Conditions Agreement Setting | Sets to display the terms and conditions and request agreement when the user logs in to SingleID for the first time. |
| PC SSO Agent Setting | Sets to check if a security program (Endpoint Security) is installed on the user’s PC using the PC SSO Agent. |
| Save Button | Saves the modified login rules. |
- In the selection list of the primary login setting, select the Authenticator to be used for login.
- If you want to allow the user to log in with another Authenticator in addition to the selected primary login method, select the checkbox (V) of And allow another factors below: and select one or more Authenticators in the text input box.
If Redirected to the external IdP is selected as the login entry method on the Initial Redirection screen, the primary login setting will not be displayed.
The primary login is performed at the external Identity Provider according to the Initial Redirection setting.
- To allow users to log in through multi-factor authentication, select the checkbox (V) of the additional login setting and select one or more Authenticators in the text input field.
- To set the terms and conditions agreement when the user logs in to SingleID for the first time, select the checkbox of the terms and conditions agreement setting and select one or more terms or conditions to be displayed on the screen in the text input box.
- To check if a security program (Endpoint Security) is installed on the user’s PC using the PC SSO Agent, select the checkbox (V) of the PC SSO Agent setting. If this setting is enabled, login will be blocked for users who do not have a security program installed on their PC.
If the PC SSO Agent is not registered, the PC SSO Agent setting item will not be displayed on the screen. While the PC SSO Agent setting is enabled, instead of blocking the login of users who do not have a security program installed on their PC, you can require additional authentication by selecting the checkbox below and selecting one or more Authenticators in the text input box.
Click the Save button to register the login rule and return to the rule list.
Rule Priority Management
If one or more login rules have been added, the administrator can set the priority of the login rules. If a user meets the conditions set for multiple rules, the login method will be applied according to the rule with the higher priority.
To set the priority of the login rules, follow the procedure below.
- Drag the ≡ area to the left of the rule name in the rule list with the mouse.
- The priority of the login rules will be determined based on the position where they are dragged and dropped.
- The higher the position in the rule list, the higher the priority.
Policy Status Change
The status of the login policy managed by SingleID is as follows.
| Status | Description |
|---|---|
| Active | Login policy that is working normally |
| Inactive | Login policy that has been suspended by the administrator |
| Current Status | Changeable Status | Description |
|---|---|---|
| Active | Inactive | You can change the active login policy to inactive by clicking the Deactivate button. |
| Inactive | Active | You can change the inactive login policy to active by clicking the Activate button. You can also delete the inactive login policy. |
Two login policies provided by default in SingleID, Admin Portal Policy and Default Policy, cannot be deactivated.
When a login policy is deactivated, the applications assigned to the deactivated login policy will be automatically changed to be assigned to the default policy (Default Policy).
Policy Deactivation
To deactivate an active login policy, follow these steps:
- Click the policy you want to deactivate in the policy list to move to the policy details screen.
- Click the Deactivate button.
- Confirm the login policy information (the number of assigned applications, the number of rules included in the login policy) displayed in the Confirm popup, and then click the Deactivate button.
When a login policy is deactivated, the applications assigned to the deactivated login policy will be automatically changed to be assigned to the default policy (Default Policy).
Even if the deactivated login policy is changed back to active, the previously assigned applications will not be automatically reassigned.
Policy Activation
To change the login policy from inactive to active, follow these steps:
- Click on the policy you want to activate in the policy list to move to the policy details screen.
- Click the Activate button to change the status of the login policy to active.
Policy Deletion
The administrator can delete the login policy from SingleID.
To delete a login policy, follow these steps:
- Click on the policy you want to delete in the policy list to move to the policy details screen.
- If the login policy is activated, click the Deactivate button to deactivate the policy.
- Click the Delete button displayed at the top right of the deactivated login policy.
- A popup screen will appear to confirm the deletion of the login policy.
- To delete the login policy, confirm the policy information, enter the name of the policy you want to delete, and click the Delete button.
Deleted login policies cannot be recovered.
When a login policy is deleted, the rules included in the policy are also deleted. Even if you register a login policy with the same name, the deleted rules or settings will not be recovered.
Access Simulation
As the number of login policies and rules increases, it can be difficult to understand which user is subject to which policy for login methods. SingleID provides an access simulation feature that allows administrators to quickly check the login policies and rules applied to users.
Using the access simulation feature, you can select a user and an application to access, and define the user’s login environment (network, device, browser, OS) to predict in advance what kind of login method the user will experience in different cases.
Additionally, if there are users who are having trouble logging in and need to review their requests, you can use the access simulation feature to quickly check and modify the policies or rules that are causing the problem.
To use the access simulation feature, click the Access Simulation button at the top right of the login policy list screen.
| Name | Description |
|---|---|
| User ID Input | Enter the user ID to be simulated. |
| Network Settings | Specify the IP of the user to be simulated. The default value is “IP address anywhere”. |
| Platform Settings | Specify the device information of the user to be simulated. The default value is “Any platforms”. |
| Browser Settings | Specify the browser information of the user to be simulated. The default value is “Any browsers”. |
| OS Settings | Specify the OS information of the user to be simulated. The default value is “Any OS”. |
| Application Selection | Select the application to be simulated. Click the application selection button to display a popup. |
| Run Simulation Button | Run the access simulation. |
| Simulation Results | Display the access simulation results on the screen. The login policies and rules applied to the specified user are displayed. |
| List Button | Return to the login policy list. |
To run the access simulation, follow these steps:
- Enter the ID of the user to be simulated.
- Specify the IP of the user to be simulated. You can select Specific IP Address and enter the IP directly. Enter the IP in the format 123.123.123.123.
- Specify the device information of the user to be simulated. You can select Platform and choose a device from the selection list.
- Specifies the browser information of the user to be simulated. After selecting Browser, you can select a browser from the selection list.
- Specifies the OS information of the user to be simulated. After selecting OS, you can select an OS from the selection list.
- Click the Application Selection button to select the target application to be simulated.
- In the Application Selection popup, click the radio button to the left of the application name to select the application, and then click the Add button.
If you want to reselect the application, click the X button to the right of the selected application name, and then click the Application Selection button again.
- Click the Simulation Run button.
- The access simulation is executed, and when the execution is finished, the login policy and rules screen are displayed according to the simulation result.
Authentication Policy
The administrator may need to change the detailed settings related to authentication according to the organization’s security policy.
SingleID manages the detailed settings related to authentication in the following four policies:
- Session policy
- Authenticator policy
- MFA Service Provider policy
- Password policy
To access the authentication policy menu, move as follows:
- Admin Portal > Policy > Authentication Policy
To modify the authentication policy, click the Modify button at the bottom right of the authentication policy screen, change the settings, and then click the Save button.
Session Policy
To change the session policy, follow the procedure below:
- Click the Modify button at the bottom right of the authentication policy screen.
- Set the maximum number of sessions that a user can create at the same time in the maximum session limit setting.
- The minimum value that can be set is 1, and the maximum value is 100. If set to 1, the user can only log in from one browser at a time and cannot log in from multiple PCs or browsers simultaneously.
- In the session priority setting, you can set the priority of the session created by the user. The priority can be one of the following two options:
- Old session
- New session
If the maximum session limit is set to 1 and Old session is selected in the maximum session limit setting, when a logged-in user attempts to log in from another PC or browser that is not logged in, the login will be blocked.
Additionally, if the maximum session limit is set to 1 and New session is selected in the maximum session limit setting, when a logged-in user attempts to log in from another PC or browser that is not logged in, the session of the previously logged-in browser will be forcibly expired, and the session of the new PC or browser will be maintained.
In the maximum session time setting, you can set the maximum time to maintain a session.
The maximum session time can be one of the following two options:
- No time limit
- Set time limit
If set to No time limit, once a session is created, it will not expire automatically until the user logs out. If set to Set time limit and a time is set, the session will expire when the set time passes, and the user will be automatically logged out. In the maximum idle session time setting, you can set the maximum idle session time.
If the maximum idle session time is set, the session will expire if the user does not make an authentication request within the set time, and the user will be automatically logged out.
To save the changed settings, click the Save button at the bottom right of the authentication policy screen.
To discard the changed settings without saving, click the Cancel button at the bottom right of the authentication policy screen.
| Name | Description |
|---|---|
| Maximum session limit setting | Sets the maximum number of concurrent sessions for the user. |
| Session priority setting | Sets the priority between the old session and the new session when the number of concurrent sessions exceeds the maximum allowed. |
| Maximum Session Time Setting | Sets the maximum time to maintain a session after it is created. The session expires when the maximum session time elapses. |
| Maximum Idle Session Time Setting | Sets the time when a session expires if a user does not make an authentication request to the server for a certain period after the session is created. |
Authenticator Policy
To change the Authenticator policy, follow the procedure below.
- Click the Edit button at the bottom right of the authentication policy screen.
- Set each item as follows.
- When the settings are complete, click the Save button.
| Name | Description |
|---|---|
| Available Authenticator Settings(for login policy) | Sets the Authenticators available for authentication. |
| Registration Authentication Method | Sets the primary identity verification method for users when registering an Authenticator. |
| Additional Authentication | Sets the additional identity verification methods allowed for users when registering an Authenticator, in addition to the primary method. |
| Account Search | Sets the authentication method for ID search. |
| Password Reset | Sets the authentication method for password search. |
| Unlock Setting | If a user fails to authenticate repeatedly using Authenticators, their ID will be locked. This setting allows you to specify a time after which the lock will be automatically released. |
- To remove an Authenticator specified in the available Authenticator settings, it must first be removed from all login policy rules.
Note: I’ve translated only the Korean text into English, leaving the rest of the content (including HTML, code, and Hugo shortcodes) unchanged. 2. Configurable Authenticators can be registered in the Authenticator addition menu. Disabled Authenticators cannot be set in the available Authenticator settings.
If you haven’t purchased the MFA product
- Available Authenticator settings (for login policy) will not be displayed on this screen.
- To purchase additional MFA products, please contact us through Support Center > Inquiry.
If a user fails to log in due to repeated incorrect password entries and is locked out, the lock will not be released even after a certain period of time. The password lock and release method should be set in the Password Policy.
If you reset a user’s password in the user menu, you can release the lock before the lock release waiting time. Please refer to the password reset.
MFA Service Provider Policy
To change the MFA Service Provider policy, follow the procedure below.
- Click the Edit button at the bottom right of the authentication policy screen.
- Refer to the table below and set each item accordingly.
- When the settings are complete, click the Save button.
| Name | Description |
|---|---|
| Available Authenticator settings (for MFA Service Provider) | Sets the Authenticator that users can use when an authentication request occurs from the MFA Service Provider. |
| Terms and Conditions option | When a user is registered from the MFA Service Provider, it can display the terms and conditions and obtain the user’s consent. |
| Lock release settings | When an authentication request occurs from the MFA Service Provider and a user fails to authenticate repeatedly, the ID will be locked. It can set the time for the locked user to be automatically released after a certain period of time. |
To remove the specified Authenticator from the available Authenticator settings, the Authenticator must be removed from all MFA Service Providers first.
The Authenticators that can be set are registered in the Authenticator addition menu. Disabled Authenticators cannot be set in the available Authenticator settings.
To set up the terms and conditions to be displayed to the user and to request the user’s consent when the user authenticates from the MFA Service Provider for the first time, check the checkbox in the terms and conditions option and select one or more terms or conditions to be displayed on the screen in the text input box.
If a user who authenticates from the MFA Service Provider repeatedly fails to authenticate, the user’s ID will be locked. To automatically unlock the lock after a certain period of time, set the lock release waiting time in the lock release settings.
Password Policy
To change the password policy, follow the procedure below.
- Click the Edit button at the bottom right of the authentication policy screen.
- Refer to the table below and set each item accordingly.
- When the settings are complete, click the Save button.
| Name | Description |
|---|---|
| Password History | You can set it to prevent the reuse of previously used passwords. Specify the number of recently used passwords to prevent reuse. The user will not be able to use the password used in the past as many times as set above. |
| Password Expiration | Specify the password validity period. After the validity period has passed, you must change your password to log in. It can be set from 1 day to 365 days. |
| Password Lock | The user’s ID will be locked when the password is repeatedly entered incorrectly. Specify the number of repeated input failures.
|
| Pattern and Complexity | Set the minimum length, minimum characters, numbers, etc. of the password. |
| Minimum Character Setting | Specify the minimum length of the password. |
| Minimum Alphabet Setting | Specify the minimum number of alphabets to be included in the password. |
| Minimum Number Setting | Specify the minimum number of numbers to be included in the password. |
| Minimum special character setting | Specifies the minimum number of special characters to be included in the password. |
| Maximum character setting | Specifies the maximum length of the password. |
| Allow using user ID as password | Sets whether to allow the user’s ID to be included in the password. |
Membership registration policy
To allow user membership registration, you must activate the membership registration policy, which allows registration of users other than those provisioned from the personnel system or IdP. It provides features to register, create, modify, and delete accounts through account synchronization, as well as invite users through the login screen or email.
To activate and use the membership registration policy, follow these steps:
- Admin Portal > Policy > Membership registration policy.
- Activate Allow user membership registration.
- After activation, the Policy tab and User invitation tab will appear.
- Refer to the explanations of the Policy tab and User invitation tab below and set the policy.
- Once the settings are complete, click the Save button.
Policy
You can set general membership registration policies.
| Name | Description |
|---|---|
| Display membership registration link on login screen | Displays the membership registration link on the SingleID login screen.
|
| Terms and conditions option | Selects the terms and conditions agreement option during membership registration. During membership registration, you can apply terms and conditions separately. |
| Allow membership registration invitation | When activated, you can invite users by email. You can set it so that only invited users can join, without a separate membership registration page. In this case, joining through the SingleID membership registration link is not possible. |
| Registration Input Form | Sets the user attributes to be input when signing up. Can be added as required. |
| ID Duplication Prevention Setting | If activated, a suffix is added to the ID to prevent duplication. This setting is to prevent cases where the ID of an existing auto-provisioned account is the same. Since there are many cases where the ID value is the same, setting is recommended. When signing up, the PostFix value is added to the end of the ID. |
| Maximum Usage Period | The maximum usage period is set after signing up. Can be set from 1 to 2000 days. |
| Approval when Signing up | When the sign-up approval setting is activated, the registered approval policy can be loaded and set. |
Approval Policy
The administrator can select the approval system and set the policy according to the type, such as sign-up policy and app access policy, with various approval lines. Various approval policies can be applied flexibly whenever the security policy changes.
Approval is possible by dividing it into self-approval system function and Knox Portal approval system. If you need to link with another approval system, please request it through 1:1 inquiry.
To check the approval policy, follow the path below.
- Admin Portal > Policy > Approval Policy
Approval Policy List
The administrator can select the approval system and set the policy according to the type, such as sign-up policy and app access policy, with various approval lines. Various approval policies can be applied flexibly whenever the security policy changes.
| Name | Description |
|---|---|
| ID | Automatically generated ID when creating an approval policy. |
| Approval System | Divided into SingleID and Knox Portal. If you need to register another approval system, please request it through 1:1 inquiry. |
| Type | Divided into app access and sign-up. |
| Status | Approval policy status. Unavailable means you need to change the approver and notifier. |
| Approval Use | Divided into in use and not in use. Details button click to view the applications using the approval policy. |
Approval Policy Registration
Register button, you can set the approval system, type, approver, notification method, and approval period.
| Name | Description |
|---|---|
| Approval System | 2 options are available.
|
| Type | 2 options are available.
|
| Approver | Select and register the approver and notifier. |
| Notification Method | Select the notification method when an approval request is received by the approver and notifier. |
Anomaly Detection Policy
SingleID collects and analyzes user behavior information in real-time before and after authentication, determining whether the authentication is abnormal. If it is identified as an abnormal authentication category, it immediately notifies the user of the risk.
To access the anomaly detection policy menu, follow these steps:
- Admin Portal > Policy > Anomaly Detection Policy