All user and organization access management in Bright has been built around several simple terms. Each term has a number of adjustable parameters to make sure that every organization and user structure can be covered by the tools presented in the Bright app.
You can operate access management in Bright using these terms:
- Organization - a logical entity that contains all of the users, groups, and resources in a given scope.
- User - a single organization member. Users can be combined into groups. Each user has its role with the relevant permissions.
- Group - several users, connected by a common role.
- Role - a number of scopes for a particular user or a group.
- Scopes - granular permissions to do something in the system.
To view your organization dashboard, in the left pane, select the Organization option.
You can require that all users in your organization use two-factor authentication (2FA). Before applying this policy, we recommend giving your users prior notice so that they have time to enable 2FA for their accounts.
To apply 2FA to user accounts, select the relevant checkbox in the ORGANIZATION SETTINGS section.
An administrator can see the 2FA status of each user in the organization in the MEMBERS section.
An organization-wide 2FA policy cannot be set to mandatory until all the administrative users have set up their own 2FA.
When enabling an organization-wide 2FA policy, the users can access their accounts only after they perform 2FA. In this case, an email notification is automatically sent to each affected user.
As a precaution, Bright only allows to scan trusted or authorized hosts.
To add a target host to the list of authorized hosts, follow these steps:
- Download the
.nexfile from your Bright organization. For that, click the
.nexlink at the bottom of the ORGANIZATION SETTINGS section.
- Add the downloaded
.nexfile to your application root directory.
Once added, the .nex file enables Bright to recognize the application, associate it with your organization, and gives Bright permission to scan the target directly, without the need for the Repeater.
- Make sure that the server can serve this file from the webroot (top directory level or just
/path) along with the other static resources from that location.
- You can always contact our support team at [email protected] or in the Intercom chart (on the bottom right of your screen) for help in authorizing hosts.
You can reuse this file as many times as needed.
The organization PLAN DETAILS section displays information about your Bright account, for example, total storage for your organization, number of engines, and the plan expiration date.
On the Organization page, you can obtain and manage authentication tokens (also called API keys) for accessing the Bright API and CLI.
To create a new API/CLI authentication token (API key), follow these steps:
- Go to the MANAGE YOUR ORGANIZATION API KEYS section and click + Create API key.
- Assign the API key a name, select which scope(s) of access to allow it and which type of actions (such as read or write) it is permitted to perform.
- Click Create.
On the popup, copy the generated key and save it to a safe place since as soon as you navigate away from this popup, you will not be able to restore this key.
The created keys without the entire values are listed in the MANAGE YOUR ORGANIZATION API KEYS section.
Updated about 2 months ago