Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »

Securing Iguana involves ensuring Users only have access to the resources they require. To achieve this, Iguana uses a Role Based permission system to control access to different features and actions.

 Creating Users and Roles for your Team

Each Iguana user should have their own User account, with unique usernames and passwords, and appropriate Roles assigned.

Not only does this improve security, but it also improves collaboration, giving you better visibility into user activity regarding Iguana configurations and integrations.

See Users and Roles for how to create and modify existing users and roles.

 IguanaX Password Requirements

Passwords must be 8+ characters, containing at least one uppercase, lowercase and numerical digit(s).

IguanaX does not enforce periodic password changes, this is managed by the end user according to organizational policies.

Once Users and Roles are configured, it is recommended to remove the default admin user.

  • No labels