- About organizations
- Managing organization settings
- Managing notifications
- Activating your Enterprise license
- Upgrading and downgrading licenses
- Requesting a service trial
- Allocating licenses to tenants
- Monitoring license allocation
- License overallocation
This page outlines the key functionalities we implemented to ensure that your interactions with the platform occur securely.
Automation Cloud includes audit logging capabilities. This allows you to maintain a detailed record of activities, user actions, and system events. Audit logs are essential for monitoring and compliance purposes, helping you track and investigate security incidents.
Authentication and authorization
Auth0 integration: We leverage Auth0 for robust and secure user authentication and authorization. Auth0 is a trusted identity management platform, providing strong authentication and authorization capabilities.
Authentication models: Our authentication model allows access to your organization with:
- Local accounts: basic authentication (user-owned email) or their existing Microsoft or Google accounts
- Directory accounts: company-managed accounts (when your third-party identity provider is connected with Automation Cloud).
Access control features
Restricting access by IP: You can restrict access to the platform based on IP addresses. This feature adds an additional layer of security by ensuring that only authorized IP addresses can access the platform.
Session policy: You can define and enforce rules for concurrent user sessions. This helps prevent unauthorized access and enhances security.
Restricting access to users: You can define access controls that restrict specific users or user groups from accessing the platform.
Custom data encryption: You can encrypt your data stored across the platform using custom encryption keys. This ensures that sensitive data is protected and only accessible to authorized users.
UiPath keys: Or alternatively, you can use UiPath keys for data encryption. This provides a secure and standardized approach to data protection.