Skip to main content

Security Options

Overview

The Security Options in EMC allow administrators to control who can access the system and from where. These settings let you restrict login access based on approved devices (browsers) and specific IP addresses, improving system security and preventing unauthorized access.

Security Options controll which users can log in using specific devices and IP addresses. You can enforce browser verification so users must have a browser / device approved by management. You can also limit EMC access to specific IP Addresses to controll the location of EMC access.

These security settings can be controlledapplied at 3three different levelslevels:

  • Group (Everyone)
  • Store
  • User

The Security OptionsSettings can also be stacked based on Priority.priority. e.g.For Youexample, canyou setmay configure an IP Whitelistwhitelist forat eachthe store,store level, and then setup additional IP Whitelist,override or removerefine thethat IPwhitelist Whitelistfor restrictionindividual byusers specificas user.required.

Accessing Security Options

To Configureconfigure security settings for a Usersuser:

Security
    Options
  1. Navigate goin EMC to the Settings > Security Options
  2. section then click on
  3. Open the Users tab.

  4. Search for the Useruser andwhose itsettings you want to update.
  5. You will showsee youfields someshowing: details
      such as the
    1. Login Mode,Mode
    2. Approved Browsers,Browsers
    3. Denied Browsers
    4. and
    5. Browsers browsersAwaiting WairingApproval
    6. Approval.
    If
  6. you click on
  7. Click the Login Mode itfield willto open thethat user'user’s settingsdetailed section.

    security configuration.

image.png

Browser Verification

If you want to enable Browser Verification, select the option "Browser must be verified". This will enable a few additional settings that can be configured. When Browser Verification isensures enabled,users whencan theonly log in from approved browsers/devices.

How It Works

  • When a user triesattempts to log intoin EMC for the first time onfrom a new PCbrowser or device:
    • EMC sends an email will be sent to a designated emailapprover addressasking requestingfor approval.
    • Once Approved,approved, thethat PC/browser combinationbrowser/device is stored in EMCsaved and can be used infor thefuture future.

      logins.
    • You

  • Users can giveoptionally thebe user the abilityallowed to self-verify their own browsersbrowser with(if Selfthey verification.have email access). This isreduces usefuladmin ifoverhead.

Enabling Browser Verification

  1. In the useruser’s hassecurity accesssettings, enable Browser must be verified
    Additional browser settings will appear.
  2. Save changes.

Common use cases:

  • Limit logins to theircompany-owned owndevices emailonly.
  • account.

  • Require admin verification for any new login device.

image.png

IP Whitelist

Whitelisting

To set an IP WhitelistWhitelisting enterrestricts theaccess IPto addressEMC inbased theon IP Start field. Give it a short description in the Comment field. Then click Insert.

There are many sites that can provide yourspecific public IP Address. Here is a common one https://whatismyipaddress.com/addresses.

image.png

How to Set Up an IP Whitelist

  1. In the IP Whitelist section for a user, store, or group:
  2. Enter the IP Start address.
  3. Add a descriptive Comment.
  4. Click Insert to save the IP entry.

TheseTip: Use a service such as whatismyipaddress.com to discover the public IP address you wish to whitelist.

Notes

  • IP Whitelist entries apply at the selected security level (User, Store, or Group).
  • You can add multiple IPs if users connect from different locations.
  • Entries can be modified or deleted at any time.

Security Option Priority and Layering

Security settings are evaluated in the samefollowing order:

  1. User-specific settings
  2. Store-level settings
  3. Group (Everyone) settings

A stricter user security rule (e.g., an IP whitelist for Users,one Storesuser) andwill Group.override broader store-level restrictions if configured.

Example scenarios:

  • A store may allow access from a corporate office IP range.
  • A specific user might be restricted further to only one IP (e.g., their home office).
  • Browser verification may be enabled for all users but disabled for specific trusted users.

Summary of Key Security Controls

Security FeaturePurpose
Browser VerificationEnsure only approved decives can log in
IP WhitelistingRestricts access to specific IP addresses.
Layered SettingsAllows flexible security at group, store or user levels.

Best Practices

✔ Use IP Whitelisting for high-security environments.
✔ Enable Browser Verification for users accessing on mobile devices with no fixed public IP Address.
✔ Review security settings periodically to ensure they match your current access needs.