User Account Settings

This topic describes the settings for Phishing Response user accounts.

User Information

Setting Description
Full Name The user’s full name for display, as shown in the list of users, at the top of each page while the user is logged in, and in the audit logs of activity.
Email The user’s email address, which is used for the user’s login credentials. Note that this email address used for the invitation email with the initial activation token.
Secondary Authentication

If your organization uses single-sign on (SSO), this option determines whether secondary authentication (username and password) is optional or required. If you do not select this option, SSO is always used, and if the SSO provider is unavailable at the moment of sign in, application access is not possible. If you select this option, you are then given two additional options:

  • Only when SSO fails: The user is prompted with a password field if the SSO provider fails
  • Exclusively (do not authenticate with SSO): The user is always prompted for a password (SSO is not used)

In addition, users are assigned one or more roles. See Roles for information about Phishing Response user roles.

Global User Account Settings

Global user account settings are managed in the User Account Settings section of the Organization tab. See Phishing Response Settings for details.