Skip to main content

Security Options

Overview

The Security Options in EMC allow administrators to control who can access the system and from where. These settings let you restrict login access based on approved devices (browsers) and specific IP addresses, improving system security and preventing unauthorized access.

Security Options can be applied at three levels:

  • Group (Everyone)
  • Store
  • User

Settings can be stacked based on priority. For example, you may configure an IP whitelist at the store level, and then override or refine that whitelist for individual users as required.

Accessing Security Options

To configure security settings for a user:

  1. Navigate in EMC to Settings > Security Options
  2. Open the Users tab.
  3. Search for the user whose settings you want to update.
  4. You will see fields showing:
    1. Login Mode
    2. Approved Browsers
    3. Denied Browsers
    4. Browsers Awaiting Approval
    5. Actions (Icons)
      1. View Browsers
      2. View User Settings
  5. Click the Login Mode field, or the View User Settings Icon field to open that user’s detailed security configuration.

image.png

Browser Verification

Browser Verification ensures users can only log in from approved browsers/devices.

How It Works

  • When a user attempts to log in from a new browser or device:
    • EMC sends an email to a designated approver asking for approval.
    • Once approved, that browser/device is saved and can be used for future logins.
  • Users can optionally be allowed to self-verify their own browser (if they have email access). This reduces admin overhead.

Enabling Browser Verification

  1. In the user’s security settings, enable Browser must be verified
    Additional browser settings will appear.
  2. Save changes.

Common use cases:

  • Limit logins to company-owned devices only.
  • Require admin verification for any new login device.

image.png

IP Whitelisting

IP Whitelisting restricts access to EMC based on specific public IP addresses.

image.png

How to Set Up an IP Whitelist

  1. In the IP Whitelist section for a user, store, or group:
  2. Enter the IP Start address.
  3. Add a descriptive Comment.
  4. Click Insert to save the IP entry.

Tip: Use a service such as whatismyipaddress.com to discover the public IP address you wish to whitelist.

Notes

  • IP Whitelist entries apply at the selected security level (User, Store, or Group).
  • You can add multiple IPs if users connect from different locations.
  • Entries can be modified or deleted at any time.

Security Option Priority and Layering

Security settings are evaluated in the following order:

  1. User-specific settings
  2. Store-level settings
  3. Group (Everyone) settings

A stricter user security rule (e.g., an IP whitelist for one user) will override broader store-level restrictions if configured.

Example scenarios:

  • A store may allow access from a corporate office IP range.
  • A specific user might be restricted further to only one IP (e.g., their home office).
  • Browser verification may be enabled for all users but disabled for specific trusted users.

Summary of Key Security Controls

Security Feature Purpose
Browser Verification Ensure only approved decives can log in
IP Whitelisting Restricts access to specific IP addresses.
Layered Settings Allows flexible security at group, store or user levels.

Best Practices

✔ Use IP Whitelisting for high-security environments.
✔ Enable Browser Verification for users accessing on mobile devices with no fixed public IP Address.
✔ Review security settings periodically to ensure they match your current access needs.