Configuring authentication security
Prerequisite
- Access to the Configuration > Authentication (CM008) menu.
Introduction
Properly configuring user passwords and logins is fundamental to ensure the security of company information.
A robust authentication process protects sensitive data against unauthorized access, prevents fraud, and guarantees that only users with the right permissions can access certain system functions, maintaining the integrity of the operations and compliance with security norms.
Through SoftExpert Configuration, it is possible to perform configurations referring to passwords and logins in SoftExpert Suite.
See how to perform such adjustments:
Configuring authentication security
1. Access the Configuration > Authentication (CM008) menu.
2. Select the Security tab.
3. Perform all necessary configurations:
Password control
In this section, it is possible to apply controls referring to system user passwords.

Request countersign when performing task: if this option is enabled, during the execution of tasks from the SoftExpert Suite components, the user executing them will be asked to confirm their countersign.
Request user countersign when performing critical operations in the system: if this option is enabled, when performing actions such as deleting, activating, or deactivating records, and other critical tasks, the user will be asked to enter their countersign before the system executes them.
Allow users to request forgotten password: if this option is enabled, the login screen will show the Forgot password? option so that the user can request a new password if they have forgotten the previous one.
In order for the countersign request resource to work properly, the users registered in the system must have a countersign defined on their data screen.
Force users password change: this button must be clicked only when the passwords of all users registered in SoftExpert Suite need to be changed. Thus, when each user logs in the next time, the system will request a password change.
Only the system administrator can perform this operation.
Password strength
Use this section to configure the options that may strengthen user passwords.
As in every system, passwords are the first line of defense against unauthorized access. The stronger the password, the more protected the system will be.
To this end, use the available options to define the requirements for system user passwords.

Minimum size: it allows for setting a minimum number of characters that each user must have in their password. When a user tries to create a password shorter than the minimum size, the system will display a message warning them that the required number of characters has not been reached. User passwords must contain at least 6 digits.
Validity (months): it allows for setting the number of months during which the system users can remain with the same password. Thus, when the defined deadline is reached, the user will be informed that their password has expired and will be asked to change it.
Repetition control: it allows for setting the number of times that the user must change their password before their former one can be repeated.
Upper and lower case characters: with this option enabled, system user passwords must necessarily contain uppercase and lower letters.
Special characters (for example: !, \$, #, %): with this option enabled, system user passwords must necessarily contain special characters (!, $, #, %, etc.).
Password requirements:
- Passwords must contain at least one number and one letter.
- Passwords must not contain the "\" and "/" characters.
- Passwords must not contain one of the following combinations: "sesuite", "53suite", "53su1te", "s3su1t3", "s35u1t3", "soft", "5oft", "S0ft", "50ft", "expert", "3xpert", "3xp3rt", "softexpert", "5oftexpert", "50ftexpert", "50ft3xpert", and "50ft3xp3rt".
- Passwords must not contain fragments with a sequence of 4 digits or more of the login, nor the user's name and e-mail.
- Passwords must not be on the list of those considered weak within SoftExpert Suite.
When a weak password is inserted, the system will display a message with the requirements that the password must meet.
Lock out user if the number of login attempts exceeds
This section must be used to configure the options for blocking unauthorized access by someone who is trying to guess the password of a system user.

Number of attempts: it allows for setting the number of times that the user may try to log in with an incorrect password before being locked out. To do so, enter the number of attempts, which can be from 1 to 5.
The user can be unblocked automatically (if the Time for which the user will be blocked (minutes) field is filled in), or manually through the Organizational unit > User (AD004) menu of SoftExpert Administration.
Time for which the user will be blocked (minutes): fill in this field to define that, once blocked due to invalid login attempts, the user will be automatically unblocked after a certain period.
In this case, define for how many minutes the user will remain blocked. Once the set number of minutes is reached, they will be automatically unblocked.
Notify administrator: with this option enabled, the system administrator will be notified by e-mail when a user is blocked due to invalid login attempts.
Others
This section provides several other user login options:

Alert the administrator when any unknown login is identified: in case of login attempts with an unknown user, the system will send the administrator a warning e-mail about who tried to connect.
Block manual operations in the user record: in the File > Organizational unit > User (AD004) menu of SoftExpert Suite, the Add button will be shown disabled. It will only be possible to create users through integration with the LDAP server.
Inactivity timeout (minutes): allows for setting how many minutes the system may remain idle, that is, without being used by the logged user. When the defined time is over, the user will be automatically disconnected and a message requesting them to reconnect will be displayed.
• Filling in this field is mandatory. For users that do not have an inactivity timeout, the system will automatically determine that they will enter idle mode after 30 minutes.
• Although the system is always configured with an inactivity timeout, each component has singularities that may change how this rule works.
For example, when an electronic file is viewed and the window remains open, SoftExpert Suite sends constant pings to prevent idleness, and the file continues to be displayed.
Synchronize login: the user will be synchronized once authenticated. This field must be checked only if one of the authentication options with LDAP is enabled. Note that only the authenticated user will be synchronized.
Multi-factor Authentication (MFA)
In this section, it is possible to configure multi-factor authentication, which confirms the identity of the user accessing the application.
Multi-factor authentication is an authentication method that requires the user to provide two or more verification factors in order to access a resource or application, which reduces the likelihood of a successful cyber attack.

As of version 2.2.1, MFA is mandatory for all customers that use the shared Cloud version of SoftExpert Suite and that do not use SSO (Single Sign-On).
For those using the on-premise version of SoftExpert Suite or a dedicated server, the decision on whether to enable MFA or not is up to each customer.
MFA provides an additional authentication layer to the login process by requiring the user to provide more than one authentication factor in order to access their account. This way, even if their login credentials are compromised, a hacker will not be able to access their account without the correct combination of the additional authentication factors.
This resource strengthens the security of user information in the system, offering best practices for protection and privacy.
If MFA is enabled, the e-mail field must be correctly completed on the user data screen, since this field will be mandatory.
Refer to the Configuring Multi-factor Authentication (MFA) topic for more details.
Conclusion
With this information, you will be able to correctly configure user passwords and logins in the system, ensuring the security of any recorded information.