DEXDash™ Copilot - Beta Testing - Pre-release & Discount Pricing Coming Soon!

myZure LLC
myZure LLC
  • Home
  • Features
    • Starter Edition
    • Pro Edition
    • Web Edition
  • Start Here
    • 1 - Download & Install
    • 2 - Start & Personal PIN
    • 3 - Get License From Web
    • 4 - Set Security Policies
    • 5 - Setup Users & eMail
    • 6 - Import Demo Bookmarks
    • Program Access Control
  • Demo
  • Tutorial
    • Navigation
    • Starter
    • Pro
    • Web
  • Buy
    • Pricing
    • Store
  • myZure LLC
    • About Us
    • Contact Us
  • More
    • Home
    • Features
      • Starter Edition
      • Pro Edition
      • Web Edition
    • Start Here
      • 1 - Download & Install
      • 2 - Start & Personal PIN
      • 3 - Get License From Web
      • 4 - Set Security Policies
      • 5 - Setup Users & eMail
      • 6 - Import Demo Bookmarks
      • Program Access Control
    • Demo
    • Tutorial
      • Navigation
      • Starter
      • Pro
      • Web
    • Buy
      • Pricing
      • Store
    • myZure LLC
      • About Us
      • Contact Us
  • Sign In
  • Create Account

  • Orders
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Orders
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Features
    • Starter Edition
    • Pro Edition
    • Web Edition
  • Start Here
    • 1 - Download & Install
    • 2 - Start & Personal PIN
    • 3 - Get License From Web
    • 4 - Set Security Policies
    • 5 - Setup Users & eMail
    • 6 - Import Demo Bookmarks
    • Program Access Control
  • Demo
  • Tutorial
    • Navigation
    • Starter
    • Pro
    • Web
  • Buy
    • Pricing
    • Store
  • myZure LLC
    • About Us
    • Contact Us

Account


  • Orders
  • My Account
  • Sign out


  • Sign In
  • Orders
  • My Account

SECURITY, POLICies & Administration

Feature Description

Security Policies & Administration


  • DEXDash™ v1.0 Designed Program-Level-Security
    • Allows the customer to control who can use your program, and what aspects of the program they can use. We call this Program Access Control. The key goals here are flexibility (every end user has different policies) and usability (customers need to be able to manage their own security and not rely on the developer to do it for them.)
    • In addition large customers have different needs to small customers (such as Active Directory integration) and so security is designed to be flexible, allowing customers to tailor the security to their needs. A range of features, including password resets, self-sign-on, guest accounts and more make Secwin the last security tool you will need.
    • Secwin is designed to work on desktop, and web applications, and supports single-tenant or multi-tenant setups. Data-level-security is also supported and the database is protected from external viewing.
    • In today's world no program, or user, stands alone. Secwin is designed to integrate to a SendEmail or SendSMS function (or both). These allow features like second factor authentication, password resets, self-sign-up accounts and so on.
  • If unauthorized uses have access to the database, and they can tamper with fields (for example deleting them, or causing them to become invalid) or delete records, then certain Secwin features may no longer be effective. For example if someone can Scan the Secwin security file, and remove a user record, then that user will no longer be able to log in.
  • If an unauthorized person does get access to the database, data inside it will not be exposed. Any data they damage can be restored from backups, and the data itself will not be compromised. 

Return to Starter Features

"How To" Tutorial - Step-by-Step:

Security, Policies & Administration


Password

  • click Security Policies and Administration command bar button
  • click Password menu option
    • Change Password panel appears
  • Enter Old Password, New Password
  • click OK


Users

  • click Security Policies and Administration command bar button
  • click Users menu option
    • Security Users panel appears
  • Maintain Users Functions Include:
    • Insert - new user
    • Copy - duplicate a selected user
    • Change - modify user account
    • Delete - remove user
    • Groups - assign user to a group
  • click Close to exit Security Users


Policies

  • click Security Policies and Administration command bar button
  • click Policies menu option
    • Security Policies panel appears
  • Policies Include: (multiple action tabs)
    • General- SMS & Email available
    • Login - Login Type, Default User Name, Remember Login, Allow Guest Login
    • Lockout - Lockout Type, Temporary Lockout Time
    • Password - Minimum Length, Expiry Days, Self-Reset Method
    • Second Factor - Authentication Type, Trigger Second Factor When, Stale Time
    • User Signup - Allow Self-Signup of new users, Group for Self-signed-up users
    • Multi-Tenant - Default Record, Company, PIN
    • Other - Comments
  • click OK to save and exit Security Policies


eMail Setup

  • click Security Policies and Administration command bar button
  • click eMail Setup menu option
    • Send Email Settings panel appears
  • General Tab Includes:
    • Email Server, Email Port, SSL Method, Username, Password, From Address
  • click OK to save and exit Send Email Settings


Access

  • click Security Policies and Administration command bar button
  • click Access menu option
    • Set Access Rights - Global panel appears
  • Global Tabs Included:
    • Per User, Per Access Point
  • click OK to save and exit Set Access Rights - Global


License

  • click Security Policies and Administration command bar button
  • click License menu option
    • Software License panel appears
  • License Tab Includes:
    • Customer, General, Modules, Attributes, Tables, Counters, License
  • Minimum required fields:  | Customer Tab |
    • Licensed to Person/Company:
    • Contact Name:
    • Contact Email:
  • Action Feature Buttons:
    • Get License From Web
      • When above values are entered and Get License From Web is clicked a license will be retrieved from license server.
      • Server will present message when license gotten successfully
      • Click OK to acknowledge message
      • Click OK to save key, and continue 
    • Get License From Clipboard 
      • (Optional feature) - only used with help from Sales
  • click OK to save and exit Software License


Tenants

  • click Security Policies and Administration command bar button
  • click Tenants menu option
    • Companies (Tenants) panel appears
  • Maintain Companies (Tenants) Functions Include:
    • Insert - new tenant
    • Copy - duplicate a selected tenant
    • Change - modify tenant account
    • Delete - remove tenant
    • Groups - assign user to a group
    • Users - assign users to tenant


eMail Log

  • click Security Policies and Administration command bar button
  • click Email Log menu option
    • Email Log panel appears
  • Email Log lists out occurrences of password requests when user has lost or forgotten it.
  • Action button:
    • Resend - resends message
  • Click Close to exit Email Log 

Password Security - Feature Gallery Images

Security, Policies, Setup & Administration

    User Security - Feature Gallery Images

    Security, Policies, Setup & Administration

      SECURITY USERS POLICIES - Feature Gallery Images

      Security, Policies, Setup & Administration

        eMail Setup - Security - Feature Gallery Images

        Security, Policies, Setup & Administration

          Set Access Rights Global - Security - Feature Gallery Images

          Security, Policies, Setup & Administration

            License - Security - Feature Gallery Images

            Security, Policies, Setup & Administration

              Tenants - Security - Feature Gallery Images

              Security, Policies, Setup & Administration

                eMail Log - Security - Feature Gallery Images

                Security, Policies, Setup & Administration

                  Identity Protection & Program Security Features

                  Identity Protection & Program Security Features

                  Identity Protection & Program Security Features

                  Identity Protection Code 


                  The user starts DEXDash™ with the entry of a Identity Protection Code. This is a secret word, phrase or string of characters that can be as long as  the user likes as long as it can be remembered. It is completely unique to the user and should be protected, and never divulged to anyone.  


                  Another way of thinking about this value is that it can be thought of in the context of a banks ATM PIN.  However, your access code can be any variation of letters, number or special characters, whereas the ATM PIN is only a string of numeric values.


                  The Identity Protection Code value is MUST BE remembered by the user.  If forgotten, the data cannot be accessed, not even by the development company.


                  Your data is uniquely encrypted, "fingerprinted" with this identity code. If your system data is stolen, compromised or otherwise exposed by nefarious means , it cannot be accessed without the entry of this value. 


                  User Name & Password


                  A user logs into the app in using a user name and password. However individual customers have individual requirements that can vary enormously from one customer to another. In addition the platform being used (desktop or web) may have special requirements that need to be supported.

                  Secwin enables logins to be as powerful, safe, and as feature-rich as possible - while at the same time making them easy enough to setup and use by mere humans has been a challenge. The result though is the most comprehensive login system available for a PC application in the world. 


                  All facets of the login system can be controlled at runtime so each customer can configure it to their own needs and policies. These features include;

                  • No logins at all - Users can choose to make the system loginless.
                  • Passwords are stored as Salted-Hashed values, not as encrypted text, in accordance with all current best practices.
                  • Second Factor Authentication using SMS or Email with Customer Defined Policies. When to require the second factor is a crucial element here, with options including every time, only on new devices, or on a time-based system.
                  • Active Directory support for those customers with an Active Directory server. This allows for password, or password-less logins against an Active Directory server, and also an optional In-Group setting on the server. This gives Active Directory Administrators complete control over who can use the program.
                  • Guest Logins (with pre-defined guest accounts) can be added. These have a user name, but no password, and usually have limited program access rights.
                  • Customer-defined password policies allow each customer to determine the password requirements for their users. Interesting options here include the prevention of password-reuse, and also the unacceptance of passwords that are commonly used by people. (So no 1234 or password weak passwords.)
                  • Customer-defined Lockout policies allow the user to determine when a user account will be locked (and for how long it will be locked) if multiple incorrect passwords are entered.
                  • Password Resets via SMS or Email
                  • Users can create new accounts (i.e. self sign-up) and be given default access rights.
                  • Multi-tenant support with either unique-user or company/user logins.

                  DEXDash™ Security Tables

                  Identity Protection & Program Security Features

                  Identity Protection & Program Security Features

                  • All sensitive information in the data tables are stored encrypted and cannot be altered (or deciphered) by unauthorized programs.


                  • Unencrypted fields are tamper resistant - editing them in an external program will make the data unusable.


                  • Tables make use a of 5-secret system meaning that data can be bound to a specific program, specific table, or specific customer.


                  • All secure information in the tables can be extended without changes to the file structure. This means that (for example) new security policies (and new settings) can be introduced and no file conversion is required.

                  DEXDash™ Data Privacy Law Compliance

                  Identity Protection & Program Security Features

                  DEXDash™ Data Privacy Law Compliance

                  • DEXDash™ data is stored encrypted, in conformance with United States and various international privacy laws.

                  Copyright © 2023 myZure LLC - All Rights Reserved.

                  DEXDash™ Copilot is Designed for Windows™ 11

                  • Home
                  • Pricing
                  • Store
                  • Contact Us
                  • Privacy Policy
                  • Terms of Service

                  This website uses cookies.

                  We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

                  DeclineAccept