Difference between revisions of "Startup FAQ"
old>Admin |
old>Admin |
||
Line 117: | Line 117: | ||
== Licenses == | == Licenses == | ||
=== Normal users === | |||
Only ''active''' users are paid for, to a minimum of 5. | |||
A service can be configured automatically deactivate inactive users. | |||
=== Anonoumous users === | === Anonoumous users === | ||
Line 124: | Line 129: | ||
=== Light users === | === Light users === | ||
Some users will only cost a fraction of a normal user license (SUL) | Some users will only cost a fraction of a normal user license (1/4 SUL) | ||
* Only read access | * Only read access | ||
* Infrequent users | * Infrequent users | ||
* Simple solutions | * Simple solutions |
Revision as of 10:56, 19 February 2020
Data handling
Storage and backup
You can choose between
- On premisis (your location)
- Cloud hosting
Cloud hosting will be handled on AWS datacentres in either Ireland or Sweden.
Backup is done to segregated triple redundant storage
- Daily for at least a month
- Monthly for at least 2 years
Access and ownership
Data in the systems belongs to exclusively to the customer.
TS support will in some cases need to access data under non-disclosure obligations.
GDPR compliance and retention
The platform contains everything needed for GDPR compliance in you systems.
Using workflow automation automatic deletion or annoumization can be set up: This should be configured in accordance with your retention and privacy policy.
A data processing agreement will be issued to your organization automatically.
Security
Authentication
Authentication is based on username/password.
Optionally 2-factor authentication can be set up using af mix of
- SMS sent to phone
- IP address of callers
Single signon integration is included for
- ADFS
- LDAP (and AD)
- Google, Azure, Facebook, LinkedIn
Authorization
User permissions are granted via inheritable group membership
Authorization schemes
- Field level control
- State model
- Data ownership
Additionally special roles can be assigned
- Administrator (backend)
- Bulk operations
Encryption
Transport encryption is based on SSL via HTTPS policies
Storage encryption is best handled via operating system measures
- Linux: LUKS
- Windows: Bitlocker
Password are hashed using BCrypt algorithm.
Protection
Platform complies with all requirements in OWASP level 2
- Hacking: SQL injection, XSS, CSRF
- Password policies
Requirements
Languages
Frontend can run multiple languages simultanously.
- Preconfigured languages
- English
- Danish
- Other languages must be setup in the backend
Backend language is english
Software
User clients
A modern browser is needed
- Chrome
- Mozilla firefox
- Microsoft edge
To use certain features an office suite will be needed (any version later than 2010)
Servers (option)
Cloud hosting servers will not require any additional software
On premesis installations will need
- Java 7+
- MySQL 5+
- Servlet engine
Technical skills
Normal user
Users will need no special traing for basic usage.
Some users may require ½ day training, for learning advanced features such as:
- Reporting and personal views
- Bulk data handling (import/export)
Developer (option)
This role is optional for customers wanted to develop solutions inhouse.
In order to build and maintain applications 1 day of training is needed.
Administrators (option)
This role is optional for customers using on premisis hosting.
Platform maintainence upgrade requires very little skill, as software is self upgrading
- Stop service
- Copy archieve
- Start service
Licenses
Normal users
Only active' users are paid for, to a minimum of 5.
A service can be configured automatically deactivate inactive users.
Anonoumous users
Anonoumous users are paid for per active interface (acces to a solution):
- All users using a specific interface is counted as a single user license (1 SUL).
- Solutions can support multiple anonoumous users via multiple interfaces
Light users
Some users will only cost a fraction of a normal user license (1/4 SUL)
- Only read access
- Infrequent users
- Simple solutions