To block user’s access to the system, you can delete this user from the list on admin portal. This will lead to automatic logout from all Fluix apps and user will not be able to access any of the company documents.
When assigning admin permission to your team members, you can always configure a level of impact they will have on the document flow process, the scope of users/groups and the folders on Fluix built-in storage they can access.
We support two-factor authentication for Admin Portal. This option is enabled in Admin Portal and can’t be reverted. If enabled, Admins will be required to enter login, password and unique pin that will be sent to a cell phone when Admin is trying to access the portal. Fluix iPad/iPhone app users can enable Passkey Lock on their devices
1) Transfer from from third-party online storage to AWS
Secure data transfer from third-party online storage generally depends on the third-party server configuration. From the Fluix side we recommend to use ‘https’ protocols with TLS 1.2 cryptographic protocols. All major cloud storages that are supported by Fluix are using TLS 1.2 as well.
When uploading files using web browser, Fluix requires the browser to support TLS 1.2 cryptographic protocols. See security White Paper for the list of cypher-suites.
2) At rest in AWS The data at rest at AWS is encrypted using AES-256, both on the database server and AWS S3 object storage.
3) Transfer from AWS to the user application
Fluix application, similarity to the web browser is using https protocol with TLS 1.2 to connect to Fluix (AWS)
4) At rest in user application
iOS version of Fluix leverages Apple iOS data protection. All data within the Fluix app is constantly encrypted using AES-256 cipher. Following the principle of least privilege, application assigns different protection classes to the files, ranging from Protected Until First User Authentication (similar properties to desktop full-volume encryption) to Complete Protection (encrypting data within 10 seconds after device locked). See Platform Security Guide for details.
Mobile device management (MDM) – is a corporate software tool that once installed on the employee’s device allows business owners and system administrators to take control over what is being performed on the company device and what kind of sources this device can reach. Furthermore, MDM allows you to set the company-wide policies like access management, file sharing, and app version control on all of your corporate devices simultaneously. The main goal of implementing the MDM is to optimize the functionality of your corporate device fleet and at the same time to keep the security and protection of the corporate network at the top priority.
What MDM allows to do:
Controlling app version distribution.
Making sure that all of your corporate equipment is configured to a coherent standard.
Updating applications, functions, or policies in an expandable manner.