Security policies
A security policy gives administrators control over how specific features in LogScale can be used. These policies provide three main types of restrictions:
Complete access control: Turn features on or off entirely.
Network-based access: Allow access only from specific IP addresses or networks.
Usage controls: Set limits on how features can be used.
For example, Dashboard security policies control whether users can create shared dashboards. Email action security policies determine if email actions are available and which email addresses can receive notifications.
Some security policies work in combination with IP Filters functionality to limit access within your organization.
The Security Policies available include:
Dashboard security policies control the ability to create shared read-only dashboards and the IP filter used.
Once you have created a group and assigned users to it, assign permissions via API tokens. For more information, see API token security policies.
API tokens provide granular access control for specific API operations. Security policies limit the availability of each token group, duration and IP filter supported.
Alerts and scheduled searches may trigger an action that for example sends an email or communicates with a third-party tool. Security Policies for Actions may limit the extent of the integration, or the URLs or emails that can be used with the action.