- Overview
- Data security and compliance
- Organizations
- Tenants
- Licensing
- Accounts and roles
- External applications
- Logging
- Migrating to Automation Cloud™
Functional security
This page outlines the key functionalities we implemented to ensure that your interactions with the platform occur securely.
Automation Cloud™ includes audit logging capabilities. This allows you to maintain a detailed record of activities, user actions, and system events. Audit logs are essential for monitoring and compliance purposes, helping you track and investigate security incidents.
-
Auth0 integration: We leverage Auth0 for robust and secure user authentication and authorization. Auth0 is a trusted identity management platform, providing strong authentication and authorization capabilities.
-
Authentication models: Our authentication model allows access to your organization with:
- Local accounts: basic authentication (user-owned email) or their existing Microsoft or Google accounts
- Directory accounts: company-managed accounts (when your third-party identity provider is connected with Automation Cloud).
-
Restricting access by IP: You can restrict access to the platform based on IP addresses. This feature adds an additional layer of security by ensuring that only authorized IP addresses can access the platform.
-
Session policy: You can define and enforce rules for concurrent user sessions. This helps prevent unauthorized access and enhances security.
-
Restricting access to users: You can define access controls that restrict specific users or user groups from accessing the platform.
-
Custom data encryption: You can encrypt your data stored across the platform using custom encryption keys. This ensures that sensitive data is protected and only accessible to authorized users.
-
UiPath® keys: Or alternatively, you can use UiPath keys for data encryption. This provides a secure and standardized approach to data protection.