Centralized control over security configuration options for both LiveVox Portal (LVP) users and agents. Single Sign On The LiveVox platform allows login you to LiveVox Products using 3rd log in using third-party Identity Providers (supports IdP), such as Okta). Using Single Sign On (SSO) administrative settings, permitted users you can easily configure and manage Identity Provider identity provider settings. Enable Single Sign On: Click on the slider to enable or disable the Single Sign On (SSO) functionality.
Info |
---|
- Once you have a user/agent set up with valid emails, you can enable SSO.
- Email Attribute is case-sensitive.
- Emails sent must match exactly what is in the user or agent email field.
|
- Authentication Standard: Login This is the login standard to use for SSO. Available options are as belowfollows:
- SAML: SAML is an acronym of for the Security Assertion Markup Language (SAML). This is the default option.
- OIDC: OIDC is an acronym for OpenID Connect.
General - Password Expire Days: Sets the number of days for until the password expirationexpires. Applies to both users and agents.
Note |
---|
| When implementing a password expire period for the first time, or reducing the number of days in the current period, all agents should be logged out to prevent any call interruption due to password expiration. In addition, if your portal uses any LiveVox Custom LiveVox Custom Applications (Scripter, for example) or you are unsure if you have integrated these types of appsapplications, reach out to your Account Management team before adding, removing or making any changes to the Password Expire Period, because because this can interrupt any active LiveVox Custom Applications. |
- Max Failed Login Attempts LVP: Sets the number of password attempts after which the user is locked out
- Max Failed Login Attempts Agent: Sets the number of password attempts after which the agent is locked out
Note |
---|
| The value of Max Failed Login Attempts LVP and Max Failed Login Attempts Agent must be between 1 and 9. Zero, null, and characters are invalid. |
- Password Reuse Restriction Count: Sets the number of previous passwords that the user or agent cannot reuse when resetting the password. The minimum and default value for this field is 4 and the maximum value is 25.
- Browser Session Security:- Requires users to log back in any time the browser is closed
- Password Strength: By using a password strength slider, you can configure the password strength to Medium, Strong, or Very Strong (left to right). Hover the mouse on the password strength slider to get the description about the password requirements.
Info |
---|
| If you change your password strength policy, for example, if you update your policy so that all passwords must meet the Strong Password level rather than the Medium Password level, the policy applies to all newly created users and agents immediately. However, this policy will only apply to existing users and agents when the system indicates that they must reset their passwords. |
- Admin Set Passwords Are Temporary: LVP users and agents must change the password on the first login or when updating the password by the permitted LVP user.
Info |
---|
| If the permitted LVP users change the password for their own user account, they are not prompted to change the password. |
Session Timeout You can enable or disable the session timeout parameters. - Browser Session Security: To ensure security, enable this parameter for the users and agents to login log in every time they launch the LVP in a browser.
- Inactivity Timeout: You can set the inactivity timer for intervals of 5 mins, 15 mins, 30 mins, 1hr, 2 hrs, or 1 day. After the lapse of the inactivity timeout, a warning message appears to the user.
- Show Inactivity Warning (Agent/User): Set this parameter to display an Inactivity warning for users and agents before the session is has timed out. For example, if you set 1min, a warning message appears one minute before the inactivity timer is activated and the user or the agent has to login log in again.
- Maximum Session Timeout: You can set the browser session timeout for 5 mins, 15mins, 30 mins, 1hr, 2hrs, 1 day, or 7 days. This setting enables the user or the agent to stay in the session according to the setting.
Subnet IP List of permitted IPs that can access the LVP. Permitted users can add/delete the IPs, as well as export files in .csv format. |