Protecting your Digital Assets
Two Factor Authentication
Secure your account with a second user authentication factor. Choose between SMS or RFC 6238 compatible OTP applications like Google Authenticator. In addition to safeguarding user sign-in, two-factor authentication can be implemented for certain actions, such as domain modifications or DNS changes. Two-factor authentication can be set according to the needs of individual division or business unit.
Fine-grained user permissions
User permissions are fully customizable. For as many users as your business model requires, each user action can be allowed or disallowed according to your specifications. Your domain portfolio can be arranged in groups such as divisions, each with its own customizable user access, permissions, and billing configuration. User access can also be restricted by IP address or range.
Our hierarchical approval system can be used to ensure your collaborative business-critical processes are guarded with self-configured approval settings, preventing actions until all stakeholders have indicated approval. Our system allows multiple approval hierarchies if required, so that if the managers of one hierarchy approve a transaction, the action may then progress to the next hierarchy for approval. The action is not carried out until approved by the last member of the relevant hierarchical tier. Hierarchical configurations per division are also possible.