File Level Access Permissions

Locktera’s Access Permissions provide robust, customizable security for your data. By setting rules for location, IP addresses, and user permissions, Locktera ensures that only authorized individuals can access sensitive files. With advanced encryption and detailed access logs, Locktera offers complete visibility and control over who can view, edit, or share your data, enhancing security at every level.​


Access Control Rules

Password Required  

Require a viewer to enter a password up to 256 characters to access content files. Locktera does not store passwords. If User forgets the password, containers cannot be accessed without it.

Lockout  

Viewers have 5 attempts to successfully enter the correct password and access the container contents. On the 6th attempt the viewer will be locked out and instructed to contact the sender.

The locked container appears as locked on Senders Dashboard. To regain access, the sender must manually unlock the container, and the viewer can reattempt access via correct password entry.

Read Only Permission    

The container contents can be designated for read only access. Viewers cannot edit, download, print, or screen capture contents.

Download Permission  

The Viewer can download container contents. Content files downloaded to their local device by the viewer are no longer encrypted. 

Files that are incompatible with the browser will not render and must be shared allowing the recipient to download the contents. This allows viewers to download the file to a local drive and access/view them via a software located on the local device. Senders are instructed to choose "Allow Download" for files that are not viewable.

Authorized Viewers  

Designate people authorized to access content files. List authorized viewers by email, organization roles, groups or allow any one with the link to access. 

Time-Limited Access  

Specify a date range that authorized viewers must access the container file.

Advanced Access Control Rules

 

Access Control  

Flexible Control: Allows container access rules to be modified. Content files are immutable, and the container password cannot be changed. Authorized Viewers, Download permission, location, IP address number of open rules can be modified.

Fixed Control: Container fixed with the original access rules ad authorized viewers. These containers cannot be modified.

Open Number  

Limit access to a specific number.

Geographical Location  

Locktera allows you to designate specific locations where containers can be accessed and block access from other locations. Multiple locations can be set for both access and restriction, using IP address geolocation to determine device locations. Geolocation is accurate to the city or region level. VPNs use their associated IP address geolocation for these rules. Designate the location where containers must be accessed.

IP Address  

Locktera allows you to designate specific IP addresses for container access and block others, with the ability to set multiple addresses for both. IP rules can limit access to a company VPN or building Wi-Fi. Locktera uses Classless Inter-Domain Routing (CIDR) for efficient IP allocation. Blocked IP addresses are logged in an Access Denied Report for monitoring. Designate IP Address from which containers can be accessed

Key benefits of using Access Control rules for each secure container :

Granular Security: Access can be tailored to individual users, locations, or IP addresses, ensuring that only authorized personnel have access to specific containers.

Enhanced Data Protection: By limiting who can view or modify data, you reduce the risk of unauthorized access, data breaches, or accidental changes.

Compliance Support: Access Control rules help enforce data security policies, making it easier to meet regulatory requirements like GDPR or HIPAA.

Audit and Monitoring: Access logs provide visibility into who accessed data and when, supporting security audits and enabling quick response to suspicious activity.

Flexibility: Multiple rules can be applied, allowing dynamic management of access across different users, departments, and geographic locations.


Reduced Attack Surface: By restricting access based on IP addresses, locations, or VPNs, you minimize potential entry points for attackers