This article provides an overview of tasks you can perform in the Admin console.
Note: Initial configuration, testing, and deployment of Beyond Identity is beyond the scope of this guide.
Configure advanced integrations
Beyond Identity integrates with products in your organization to provide “Zero Trust Authentication." Click here to view the integration guides for supported applications.
Define policies
-
Defining policies - Use policy rules to allow or deny access to web apps based on user, group, device, installed applications, running processes, and event behavior.
-
Risk signals & policy configurations - View examples of how you can leverage risk and misconfiguration detections to enable security controls via the policy engine.
-
Risk signals & policy configurations - View examples of how you can leverage risk and misconfiguration detections to enable security controls via the policy engine.
Monitor passkeys and risks
- Managing passkeys - Select the Fleet Overview tab to quickly view a summary of passkeys on potentially vulnerable devices in your fleet. You can also view details, revoke, or export a list of passkeys.
- Viewing authentication and passkey insights - Assess your overall fleet composition with a breakdown of authentications over the last 0-90 days as well as information about added passkeys.
- Understanding risk insights (early access feature) - Provides easy-to-use and intuitive threat intelligence analytics. This feature will help you identify users, passkeys, and authentications that have displayed some risk over the last 0-90 days.
-
Viewing event information - View the type, outcome, and that affected the outcome for events.
-
Viewing policy match details - View a history of policy match events along with the policy (the set of rules) that were in effect at the time of the event. This allows administrators to view and troubleshoot policy matches.
-
Viewing policy match details - View a history of policy match events along with the policy (the set of rules) that were in effect at the time of the event. This allows administrators to view and troubleshoot policy matches.
Configure settings in the Admin console
- Configuring role-based access control (RBAC) - Beyond Identity provides role-based access control (RBAC) functionality in the Admin Console. RBAC allows a tenant administrator to grant access to certain Admin Console features to different users based on predefined roles.
- Configuring roaming authentication (optional) - Roaming authentication allows users to authenticate from another device that has the authenticator installed and a valid credential on it.
- Configuring advanced settings (optional) - Customize authentication error messages displayed to users in the authenticator and provide a contact for them to reach out to for help or more information.
- Managing authenticator updates - Configure version control for authenticators and manage how users receive authenticator updates.
Comments
0 comments
Please sign in to leave a comment.