(Dansk version)


Overview

These settings help you with rules for login; Normal, two-factor, One-time passwords, or setup of Microsoft Identity login (for the later, see more here Microsoft Entra ID authentication)


Finding your settings

  1. Click the DocuNote tab, and then click Settings*.*
  2. In the left navigation panel, click Web settings and then click Security*.*
  3. Check the following settings:
Setting Description
Security
(624) MultifactorAuthentication Defines which login method to use on DocuNote Web Edition. Available settings:
Normal, Sms-pinkode, One-time password (sms) or Authenticator
(792) Trust device in number of days Allows user authentication to remain valid for the specified number of days

Default: 30 days Grayed out if setting (624) is anything other than Authenticator | | (625) SMS URL | Defines which address the SMS service is coming from. This setting is only relevant if DocuNote has been setup for Two factors login method.

SMS URL with [USERNAME] and [API_KEY] included (from CPSMS.dk) Replace [USERNAME] and [API KEY] in the following URL: https://www.cpsms.dk/sms/?username=[USERNAME]&apikey=[API_KEY]&recipient[]={recipient}&message={message} &from=DocuNote&utf8=1

Grayed out if setting (624) is “None” or “Authenticator” | | (626) Pin length | Defines how many characters the pin to the two factor SMS contains. The pin can contain only numbers, characters or both (mixed).

Grayed out if setting (624) is “None” or “Authenticator” | | (627) Pin content | Defines whether the pin is only numbers, characters or mixed.

Grayed out if setting (624) is “None” or “Authenticator” | | (685) Maximum count attempts by the accounts | Defines how many times users can fail login before the user is being blocked | | (686) Maximum count attempts by the IP number | Defines how many times users can fail login before the IP is being blocked | | (693) Document SAS link lifetime (min) | REST API. Defines how long time links to documents is available before they turn invalid. SAS (Share Access Signature). | | (785) Client regular login | Define normal login for Form based solutions (See ‣)

(Deactivated for non Form base solutions) | | (786) Client Entra ID login | Define authentification via Entra ID login for Form based solutions (See ‣)

(Deactivated for non Form base solutions) | | (760) Regular login | Checkbox for activating Regular login | | (761) Microsoft Identity login | Checkbox for activating Microsoft Identity login Please note: Microsoft Azure Portal needs to be configured for this to work. See Microsoft Entra ID authentication | | (762) ClientId | ClientId from Micosoft Azure Portal configuration | | (763) TenantId | TenantId from Micosoft Azure Portal configuration |

  1. Save your changes, if you have any.

(Navigate to top of page)