<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Monetization Web Docs | Tridens Technology – Security</title><link>/monetization-web-docs/categories/security/</link><description>Recent content in Security on Monetization Web Docs | Tridens Technology</description><generator>Hugo -- gohugo.io</generator><atom:link href="/monetization-web-docs/categories/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Docs: Activity Log</title><link>/monetization-web-docs/security/activity-log/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/monetization-web-docs/security/activity-log/</guid><description>
&lt;p>The Activity Log is a powerful security and auditing tool that provides a detailed, chronological record of actions performed on key business objects within the system. It is designed to give you a clear understanding of data workflows, enhance security by tracking user activity, and simplify troubleshooting.&lt;/p>
&lt;p>By tracking who did what and when, you can maintain a complete and immutable audit trail for compliance, operational management, and internal controls.&lt;/p>
&lt;h2 id="key-use-cases-and-benefits">Key Use Cases and Benefits&lt;/h2>
&lt;p>The Activity Log is more than just a record of events; it&amp;rsquo;s a critical tool for maintaining data integrity and security. Here are some practical ways you can use it:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Accelerate Troubleshooting:&lt;/strong> When a customer reports an unexpected change to their subscription or an invoice appears incorrect, the Activity Log is your first place to look. You can filter the log by the specific Customer or Subscription ID to see a full history of changes, pinpointing exactly who made the change, what was altered, and when.&lt;/li>
&lt;li>&lt;strong>Strengthen Security and Compliance:&lt;/strong> For financial audits (like SOX compliance), you must demonstrate control over who can modify sensitive information. The Activity Log provides an immutable record of all changes to critical objects like Products, Plans, and Invoices. You can easily export this data to prove that your internal controls are working effectively.&lt;/li>
&lt;li>&lt;strong>Monitor User Activity:&lt;/strong> Keep an eye on actions performed by specific users, especially those with high-level permissions. This helps ensure that all actions are authorized and aligns with company policies.&lt;/li>
&lt;/ul>
&lt;h2 id="scope-of-the-activity-log">Scope of the Activity Log&lt;/h2>
&lt;p>The Activity Log is designed to be comprehensive, but it&amp;rsquo;s important to understand what is and isn&amp;rsquo;t tracked.&lt;/p>
&lt;h3 id="what-is-logged">What is Logged?&lt;/h3>
&lt;p>The log captures significant business events, primarily focusing on Create, Read, Update, and Delete (CRUD) actions for key business objects that you configure. This includes:&lt;/p>
&lt;ul>
&lt;li>Changes made by users through the GUI.&lt;/li>
&lt;li>Changes made via API calls.&lt;/li>
&lt;li>Significant system events (e.g., plan transitions).&lt;/li>
&lt;/ul>
&lt;h3 id="what-is-not-logged">What is Not Logged?&lt;/h3>
&lt;p>The Activity Log does not track:&lt;/p>
&lt;ul>
&lt;li>Every single API call, especially those that only read data without making changes (unless &lt;code>Read&lt;/code> is explicitly configured for tracking).&lt;/li>
&lt;li>Internal system processes that do not directly relate to a change in a business object.&lt;/li>
&lt;/ul>
&lt;h2 id="configuring-the-activity-log">Configuring the Activity Log&lt;/h2>
&lt;p>You have full control over which actions are tracked for specific business objects. This allows you to focus on logging the most critical data for your business needs. The configuration is managed in the &lt;strong>Business Configuration&lt;/strong> section.&lt;/p>
&lt;h3 id="how-to-add-a-new-log-configuration">How to Add a New Log Configuration&lt;/h3>
&lt;ol>
&lt;li>
&lt;p>Navigate to &lt;strong>Business Configuration &amp;gt; Activity log&lt;/strong> from the main menu.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Click the &lt;strong>+ Activity log&lt;/strong> button in the top-right corner.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>In the &lt;strong>Add activity log&lt;/strong> dialog:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Type&lt;/strong>: Select the category of the object. In most cases, this will be &lt;code>Entity&lt;/code>.&lt;/li>
&lt;li>&lt;strong>Target&lt;/strong>: Choose the specific business object to monitor (e.g., &lt;code>Customer&lt;/code>, &lt;code>Subscription&lt;/code>, &lt;code>Plan&lt;/code>).&lt;/li>
&lt;li>&lt;strong>Actions&lt;/strong>: Select the actions you want to log (&lt;code>Create&lt;/code>, &lt;code>Read&lt;/code>, &lt;code>Update&lt;/code>, &lt;code>Delete&lt;/code>).&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>Click &lt;strong>Submit&lt;/strong> to save the configuration. The system will immediately begin logging the actions you specified.&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>&lt;img src="../activity-log-configuration.webp" alt="Configuring the Activity Log">&lt;/p>
&lt;h3 id="best-practices-for-configuration">Best Practices for Configuration&lt;/h3>
&lt;ul>
&lt;li>&lt;strong>Be Specific:&lt;/strong> Avoid logging everything. Focus on the objects and actions that are most critical for your security, compliance, and operational needs. Logging &lt;code>Update&lt;/code> and &lt;code>Delete&lt;/code> actions on financial objects is a great starting point.&lt;/li>
&lt;li>&lt;strong>Avoid Excessive Read Logging:&lt;/strong> Tracking &lt;code>Read&lt;/code> actions can generate a very high volume of data and may slow down system performance. Only enable this if you have a specific security requirement to monitor who is viewing sensitive data.&lt;/li>
&lt;li>&lt;strong>Regularly Review:&lt;/strong> Periodically review your log configurations to ensure they are still aligned with your business needs.&lt;/li>
&lt;/ul>
&lt;h2 id="viewing-and-investigating-logs">Viewing and Investigating Logs&lt;/h2>
&lt;p>Once configured, the system generates log entries that you can view, filter, and export.&lt;/p>
&lt;h3 id="how-to-view-and-filter-logs">How to View and Filter Logs&lt;/h3>
&lt;p>&lt;img src="../activity-logs-overview.webp" alt="Configuring the Activity Log">&lt;/p>
&lt;ol>
&lt;li>Navigate to the log viewer screen (e.g., &lt;strong>Users &amp;gt; Activity Logs&lt;/strong>).&lt;/li>
&lt;li>You will see a list of all captured events, sorted by date.&lt;/li>
&lt;li>Use the powerful filtering options to investigate specific events:
&lt;ul>
&lt;li>&lt;strong>Date Range:&lt;/strong> Narrow your search to a specific time period.&lt;/li>
&lt;li>&lt;strong>Target Object and ID:&lt;/strong> Filter for a specific object (e.g., &lt;code>Customer&lt;/code>) and even a specific instance (e.g., Customer ID).&lt;/li>
&lt;li>&lt;strong>User:&lt;/strong> See all actions performed by a specific user.&lt;/li>
&lt;li>&lt;strong>Action Type:&lt;/strong> Isolate all &lt;code>Create&lt;/code> or &lt;code>Delete&lt;/code> actions.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ol>
&lt;h3 id="understanding-the-log-data">Understanding the Log Data&lt;/h3>
&lt;p>Each log entry contains detailed information to help you understand the event:&lt;/p>
&lt;table>
&lt;thead>
&lt;tr>
&lt;th>Column&lt;/th>
&lt;th>Description&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>&lt;code>Created on&lt;/code>&lt;/td>
&lt;td>The exact date and time the action occurred.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;code>IP Address&lt;/code>&lt;/td>
&lt;td>The IP Address of user who performed the action.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;code>User&lt;/code>&lt;/td>
&lt;td>The user who performed the action. This may show &amp;ldquo;System&amp;rdquo; for automated processes.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;code>Target&lt;/code>&lt;/td>
&lt;td>The type of business object that was affected (e.g., &lt;code>Subscription&lt;/code>).&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;code>Target ID&lt;/code>&lt;/td>
&lt;td>The unique identifier of the specific object that was changed.&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;code>Action&lt;/code>&lt;/td>
&lt;td>The action performed (&lt;code>CREATE&lt;/code>, &lt;code>UPDATE&lt;/code>, &lt;code>DELETE&lt;/code>).&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>&lt;code>Details&lt;/code>&lt;/td>
&lt;td>A human-readable summary of the change. For &lt;code>UPDATE&lt;/code> actions, this will show the old and new values for the fields that were modified.&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table>
&lt;h3 id="exporting-log-data">Exporting Log Data&lt;/h3>
&lt;p>You can export your filtered log view for offline analysis, archival, or audit requests. Click the &lt;strong>More&lt;/strong> button to download the data, typically in CSV format, which can be opened in any spreadsheet application.&lt;/p>
&lt;h2 id="permissions-and-data-retention">Permissions and Data Retention&lt;/h2>
&lt;ul>
&lt;li>&lt;strong>Permissions:&lt;/strong> Access to configure and view the Activity Log is controlled by user permissions. Typically, only administrative users have the ability to change log configurations, while other users may have view-only access.&lt;/li>
&lt;li>&lt;strong>Data Retention:&lt;/strong> Activity Log data is retained for a specific period to comply with audit and security standards. Please refer to your service agreement for the exact data retention policy.&lt;/li>
&lt;/ul></description></item><item><title>Docs: Authentication Settings</title><link>/monetization-web-docs/security/authentication-settings/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/monetization-web-docs/security/authentication-settings/</guid><description>
&lt;p>Authentication is a critical part of securing your &lt;strong>Monetization&lt;/strong> environment.&lt;br>
The platform allows administrators to define how users log in, how long sessions remain active, and what security measures (such as Multi-Factor Authentication) are required to protect accounts.&lt;/p>
&lt;p>To configure authentication settings:&lt;/p>
&lt;ol>
&lt;li>Open the &lt;i class="fa fa-bars" aria-hidden="true">&lt;/i> &lt;strong>Menu&lt;/strong> (bottom left, click on your username).&lt;/li>
&lt;li>Select &lt;i class="fa fa-user" aria-hidden="true">&lt;/i> &lt;strong>Business Portal&lt;/strong>.&lt;/li>
&lt;li>Click &lt;strong>Security&lt;/strong>.&lt;/li>
&lt;/ol>
&lt;p>The &lt;strong>Authentication Settings&lt;/strong> page is displayed.&lt;/p>
&lt;p>&lt;img src="../security-authentication-authentication-settings-page.png" alt="Authentication Settings Page">&lt;/p>
&lt;hr>
&lt;h3 id="available-settings">Available Settings&lt;/h3>
&lt;h4 id="session-timeout">Session Timeout&lt;/h4>
&lt;p>The &lt;strong>session timeout&lt;/strong> determines how long a user can remain inactive before being automatically signed out.&lt;br>
This helps protect against unauthorized access if a user forgets to log out.&lt;br>
Enter the duration in seconds (e.g., &lt;code>300&lt;/code> for 5 minutes).&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Tip:&lt;/strong> For production environments, we recommend setting a shorter session timeout (e.g., 10–15 minutes) to minimize security risks.&lt;/p>
&lt;/blockquote>
&lt;hr>
&lt;h4 id="single-sign-on-sso-providers">Single Sign-On (SSO) Providers&lt;/h4>
&lt;p>Single Sign-On (SSO) enables users to log in with their existing accounts from trusted providers, reducing the need for separate credentials.&lt;br>
Monetization supports several SSO integrations out of the box:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Google&lt;/strong> – Allow users to authenticate using their Google Workspace or Gmail account.&lt;/li>
&lt;li>&lt;strong>Twitter&lt;/strong> – Enable login with Twitter credentials.&lt;/li>
&lt;li>&lt;strong>Facebook&lt;/strong> – Allow authentication via Facebook accounts.&lt;/li>
&lt;li>&lt;strong>Microsoft Entra ID&lt;/strong> – Integrate with Microsoft’s enterprise identity service (formerly Azure AD).&lt;/li>
&lt;li>&lt;strong>Custom OIDC Provider&lt;/strong> – Configure any identity provider that supports the OpenID Connect (OIDC) standard.&lt;/li>
&lt;/ul>
&lt;p>You can enable one or more providers depending on your organization’s needs.&lt;br>
For example, enterprises typically use &lt;strong>Microsoft Entra ID&lt;/strong> or &lt;strong>Google Workspace&lt;/strong>, while customer-facing applications may offer &lt;strong>social logins&lt;/strong> like Facebook or Twitter.&lt;/p>
&lt;p>👉 See our step-by-step guide: &lt;a href="https://tridenstechnology.com/how-to-set-up-sso/">How to Set Up Keycloak as an Identity Provider for Entra ID SSO&lt;/a>&lt;/p>
&lt;p>&lt;img src="../security-authentication-identity-providers-page.png" alt="Create Identity Provider">&lt;/p>
&lt;hr>
&lt;h4 id="multi-factor-authentication-mfa">Multi-Factor Authentication (MFA)&lt;/h4>
&lt;p>Multi-Factor Authentication (MFA) requires users to provide an additional verification method (such as an authenticator app or SMS code) during login.&lt;br>
Enabling MFA significantly improves account security by ensuring that a stolen password alone cannot be used to access the system.&lt;/p>
&lt;p>To enable MFA, toggle the &lt;strong>Multi-Factor Authentication&lt;/strong> switch. Once enabled, all users will be required to complete MFA when signing in.&lt;/p>
&lt;hr>
&lt;h4 id="password-policy">Password Policy&lt;/h4>
&lt;p>A strong password policy is essential to prevent brute-force attacks and ensure account safety.&lt;br>
Administrators can configure the following rules:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Minimum password length&lt;/strong> (recommended: 12 or more characters).&lt;/li>
&lt;li>&lt;strong>Maximum password length&lt;/strong>.&lt;/li>
&lt;li>&lt;strong>Password expiration&lt;/strong> (maximum password age in days).&lt;/li>
&lt;li>&lt;strong>Complexity requirements&lt;/strong>:
&lt;ul>
&lt;li>At least one uppercase letter.&lt;/li>
&lt;li>At least one lowercase letter.&lt;/li>
&lt;li>At least one digit.&lt;/li>
&lt;li>At least one special character.&lt;/li>
&lt;li>Restrict use of email or username in the password.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;p>These policies ensure that users create secure and unique passwords that are harder to guess or reuse.&lt;/p>
&lt;hr>
&lt;h3 id="saving-changes">Saving Changes&lt;/h3>
&lt;p>Once you have updated the settings, click &lt;strong>Submit&lt;/strong> to apply and save the configuration.&lt;br>
Changes take effect immediately for all new logins and sessions.&lt;/p>
&lt;hr>
&lt;h3 id="best-practices">Best Practices&lt;/h3>
&lt;ul>
&lt;li>&lt;strong>Always enable MFA&lt;/strong> for production environments.&lt;/li>
&lt;li>&lt;strong>Use SSO&lt;/strong> whenever possible to centralize identity management and reduce password fatigue.&lt;/li>
&lt;li>&lt;strong>Set strong password policies&lt;/strong> (minimum length of 12–16 characters with complexity rules).&lt;/li>
&lt;li>&lt;strong>Adjust session timeout&lt;/strong> based on compliance or security needs (shorter timeouts for high-security accounts).&lt;/li>
&lt;/ul></description></item></channel></rss>