Skip to main content

Access Identity - Advanced Guide

Denisa Arjoca avatar
Written by Denisa Arjoca
Updated over a month ago

This article provides links to some of the more advanced aspects of Access Identity in more detail.


Two factor authentication

Two Factor Authentication (2FA) is an optional (but recommended) security feature which any user can decide to switch on. For more information, please refer to this article .


Impersonation Setup

Impersonation is the recommended way of being able to gain access to a user’s account for support/configuration purposes. Previously it may have been the case that a customer provided their username/password to allow someone to investigate an issue – however, this should no longer be done for security/auditing reasons. For more information, please refer to this article .


Custom Security Policy

For organisations that have specific security requirements or want to use some advanced functionality such as Federation Services – they will need to create a custom security policy and assign it to their verified domain (in order for the users who are logging in with that domain in their email address to inherit that security policy). For more information, please refer to this article .


Verifying Domain Ownership

Before a custom security policy can actually be used, it needs to be assigned to a particular domain. This domain is the organisation’s domain which appears in their user’s email addresses (e.g. for Access it would be theaccessgroup.com). For more information, please refer to this article .

Did this answer your question?