- User basics
- User permissions overview
- Resolve user access issues
- Edit user information
- Edit user group membership
- Assign a user to a manager
- Edit team members
- View a user report
- Customize user profile fields
- Set login and password policies
- Configure single sign-on
- Create additional administrators
- Manage guests
- Bulk user import
-
Manage Users
- User basics
- User permissions overview
- Resolve user access issues
- Edit user information
- Edit user group membership
- Assign a user to a manager
- Edit team members
- View a user report
- Customize user profile fields
- Set login and password policies
- Configure single sign-on
- Create additional administrators
- Manage guests
- Bulk user import
- Manage groups
- Cost centers
- Audio providers
- User interface customization
- Compliance and control
- Administration dashboard
Security-related settings are located under Session settings and More settings.
Set the session timeout
Timeout settings allow users to close and reopen any number of sessions in the Windows and Mac desktop app without requiring re-logging in.
- Choose Account > Session Settings.
- Enter a timeout length for the apps:
- Browser app: Enter a value in minutes from 5 to 720. The default is 30 minutes.
- Desktop and mobile apps: Enter a value in minutes from 0 to 43,200. The default is 4 days.
- Specify whether the desktop app should remember users across sessions or should require a new log in after their current session expires.
- Choose Save.
Note: Server admins managing the an on -premise Adobe Connect server may also configure timeout settings may at the account level.
Configure same origin policies
Same-origin policies are a standard security mechanism that restricts how web content loaded by one origin can interact with a resource from another origin. Such policies strengthen security by isolating potentially malicious content and blocking attack vectors for content that originates from a source outside the current origin. For content to be considered from the same origin, it must share the protocol and host with the currently loaded content.
- Navigate to Admin > Account > More settings.
- Check Configure X-frames.
- From the Allow from/ancestors drop down list, specify whether to allow content from only the origin or from the origin’s ancestors.
- If the previous field only allows content from the same origin, you cannot configure the Allow from URI/ancestor source drop down list. If you’ve allowed content from custom origins and ancestors, specify an allowed custom domain.
- Specify whether to use additional (alternate) origins for event modules: If you check Use the following (different) ALLOW FROM settings, enter a custom domain. Separate entries with spaces.
- Configure the other security settings on the security page or choose Save.
Require SSL and enhanced security
- Select Requires SSL Connection (RTMPS) to require SSL.
- HTML content sanitization: Do not use. In development.
- Specify whether to enable enhanced security. Enabling this option:
- Forces web services APIs to use HTTPS
- Generates a new session identifier after a successful log in.
- Configure the other security settings on the security page or choose Save.
Configure CSRF
Adobe Connect enables end users or admins to enforce CSRF protection for state-changing XML API calls. Adobe recommends that you enable CSRF protection for XML APIs as it is the most secure configuration.
To enable CSRF protection:
- Navigate to Admin > Account > More settings.
- Configure cross-site request forgery (CSRF) protection:
- Specify whether to enable CSRF protection for the XML API.
- Specify whether XML API calls on a specific path should be exempt from CSRF. Checking this box generates a unique URL you can use in your API calls.
- Configure the other security settings on this page or choose Save.
Configure CSRF with web services
Adobe Connect enables end users or admins to enforce CSRF protection for state-changing XML API calls. We recommend that you enable CSRF protection for XML APIs, as it is the most secure configuration.
To enable CSRF protection, follow the steps below:
- On the Adobe Connect central page, click Administration > Account > More Settings.
- In the section CSRF Settings, check the option Enable CSRF Protection for XML API.
- CSRF protection relies on the client to send a secure session-specific CSRF cookie and a matching request parameter. All state-changing API calls are protected, for example:
- acl-create
- acl-field-update
- acl-multi-field-update
- permissions-update
- sco-update
- sco-upload
- After you authenticate, the following cookies are generated:
- BREEZESESSION as the main Connect session cookie
- BreezeCCookie as the CSRF cookie, based on the Connect session cookie
- Call the common-info API to get the CSRF token corresponding to the CSRF cookie (BreezeCCookie). The CSRF token is returned as <OWASP_CSRFTOKEN><token>...........</token></OWASP_CSRFTOKEN>
- Send all subsequent HTTP GET API calls that change state with the BreezeCCookie as a cookie and a OWASP_CSRFTOKEN. For example: https://\[SERVER_URL\]/api/xml?action=\[state changing action\]&........&OWASP_CSRFTOKEN=[token_extracted_above]
- For integrations that call single or multiple XML APIs via a single HTTP POST method, send the OWASP_CSRFTOKEN (along with the BreezeCCookie CSRF cookie), as <actions mode='...' OWASP_CSRFTOKEN=[token_extracted_above]>
- Enable the option Exempt CSRF Protection for XML API calls to the following path. When you check this option, a server-generated secure URL appears. This URL allows accounts ith XML API integrations to continue making their XML API calls against a secure and unique server-generated URL path.
Configure universal voice
- Navigate to Admin > Account > More settings.
- Enable and disable universal voice for selected telephony providers.
- Configure the other security settings on this page or choose Save.