Limit each users functions and data access
Control access to features and data for each user in your company
At AccountTECH, security isn’t just about keeping data safe; it’s about ensuring that users only see and interact with what they are authorized to access. This approach minimizes risks and ensures compliance with each client’s unique business needs. Our multi-layered login and access control system provides highly granular security and customization for every user.
1. Username and Password Protection
- Users begin by entering their unique username and a secure password.
- To ensure account integrity, we enforce a password reset every 42 days, encouraging strong, up-to-date passwords to reduce vulnerabilities.
2. Two-Factor Authentication (2FA)
- After entering their password, users must authenticate via two-factor authentication (2FA), which sends a one-time code to their registered mobile device.
- This extra layer of security helps prevent unauthorized access, even if login credentials are compromised.
3. Customized Access Control
Once the login is approved, access is highly tailored based on the user’s role and permissions set by their company.
Company Authorization
- Users can only access data and features for the specific companies they are authorized to work with.
Office Authorization
- Access is further refined by office location, ensuring users only see information relevant to their assigned branches.
Screen and Report Authorization
- Every user has custom permissions defining:
- Screens they can view and use.
- Reports they can access, limiting visibility to only the data they need.
- This ensures sensitive information is only accessible to those who need it.
Bank Account Access
- For users working with financial data, permissions extend to specific bank accounts, restricting what accounts they can view or process transactions for.
4. Final Login Approval
Once all security layers are validated, the system grants login approval. At this point, the user’s access is fully customized and secured, ensuring they can only interact with the features and data they are authorized for.