Logo Help Portal
  • Getting Started

    Introduction

    • Onboarding overview
    • Project Initiation
    • Email compliance
    • Account Administration

    Data

    • Data exchange
    • Data onboarding
    • Web data collection
    • Strategic Platform Integrations

    Channels

    • Email onboarding
    • Smart Insight
    • Predict
  • Training

    Resources

    • Introduction
    • Online Self-learning
    • Onboarding Videos

    Events

    • Instructor-led Training
    • Webinars
    • Seminars
    • Training Calendar
  • User Guides

    Strategy

    • Personalization
    • Automation
    • Data Monitoring

    Channels

    • Email
    • Mobile Apps
    • Web
    • Ads
    • SMS

    Add-ons

    • Smart Insight
    • Predict
    • Incentive Recommendation
    • AIM
    • Relational Data
  • News & Support
    Forrester Wave CCCM (Independent Platforms) Report Q4 2019

    News

    • What’s New in the Emarsys Platform
    • Updates from the CSA
    • Pilot-Features
    • Articles on Data Protection and GDPR

    Support

    • Help and Support at Emarsys
    • Managing your user profile
    • Preparing for Black Friday 2019
    • Black Friday 2019 - Best practices
  • |
  • Partners

    Enhance Partners

    • Getting Started as an Emarsys Partner
    • The Emarsys Integration Platform
    • Automation Center Integrations
  • Developers
  • System Status
Need help?
English Deutsch Español Français Русский Türkçe 简体中文 Test New Chat
Sign in
  • Getting Started
  • Account and User Administration
  • 0 Getting Started Account and User Administration

In this section:

  • About Account Owners
  • Your account Security Settings
  • Creating and managing users
  • User roles and permissions
EDIT
Expand all

Your account Security Settings

Updated: August 13, 2019 13:29
115004740329
Your account Security Settings

The Security Settings page of the Admin menu is available to Account Owners only. Here you can set the security levels for account access and data management.

Contents

  • Permitted email domains for users
  • IP access control
  • API users
  • WebDAV users
  • Key-based SFTP Auto-imports
    • Creating the key
    • Managing keys

Permitted email domains for users

In order to keep your account secure from unauthorized access, all users must activate their profile via a link in an email sent from Emarsys. Before they can receive this email, their email domain must be listed here.

Since this is also true for all emails relating to account security and user management, such as password reset, it is recommended to keep all domains used by active user profiles in this list.

You can enter as many domains as you like, but there must be at least one (e.g. the email domain of the Account Owner).

IP access control

Even if a user’s login name and password are compromised, you can still prevent unauthorized access with these credentials by restricting login to approved IP addresses (these can be provided by your own IT Support). All other IP addresses will require the additional security precaution of two-step authentication. The settings for two-step authentication are found on each user’s Profile page.

When you first enable IP access control, no IP addresses are whitelisted.

This is the most secure setting, since every user will require two-step authentication.

You can then add single IP addresses (your own IP address is helpfully displayed) or ranges of addresses.

Users logging in from one of the whitelisted IP addresses (or ranges) can log in with their user name and password only.

Users logging in from all other IP addresses must confirm their identity via two-step authentication. (If using a smartphone authenticator app, users can also ask Emarsys to remember individual devices, enabling login with user name and password from that device for 14 days, regardless of the IP address.)

Emarsys strongly recommends activating this feature! If you do not, Emarsys disclaims all responsibility for any damage resulting from unauthorized access.

API users

In order to keep your API secure you should change your user name and secret key regularly.

These API users are created with a matching key which is available while the confirmation dialog is open. You can copy and paste the key from here. After you close the dialog, the key cannot be retrieved and a new user must be created.

WebDAV users

Although Emarsys strongly recommends using the API or an SFTP server for secure data transfer, we also make WebDAV storage available for our customers who do not have the requisite technical support.

Your WebDAV storage will be created as soon as you create your first WebDAV user. Like the API user, you should change the WebDAV user and secret regularly and the key is only available to copy while the confirmation dialog is open.

Key-based SFTP Auto-imports

With this feature you can easily and conveniently set up auto-import events from your SFTP servers. We use 4096-bit RSA keys for optimal security.

Creating the key

To create a key for your SFTP server authentication, open Keyring tab and click Create Key.

Give the key a clear and recognizable name for later identification, for example the server where it will be used for authentication.

When you have created the key, the confirmation dialog will show you the key’s name, creation date, the SHA1 fingerprint associated with it and the OpenSSH public key to be used in your SFTP server configuration.

This key will now be available for selection in the Remote source options when setting up your auto-imports.

Managing keys

Click to view the details of any key.

Click to delete any old or unwanted keys.

Was this article helpful?

Have more questions? Submit a request
Return to top

Emarsys is a Leader

You may also be interested in:

Related articles

  • Introduction to the Emarsys API
  • Overview:: The Emarsys system fields
  • End-user guides:: Open Data - End-user guide
  • Sender Authentication Guide
  • Overview:: Smart Insight FAQ
Copyright © 2019 Emarsys eMarketing Systems. All rights reserved
Legal Notice Privacy Policy Master Services Agreement Anti-spam Policy