Administration application
The vault administration application allow administrators to have a global view of the Vault uses in your enterprise. Some settings are available to fit your requirements.
To add an access to this application, the Trustelem administrator have to add access permission to this application to desired users.
The application has four sections :
- Indicators dashboard
- Users list
- Shared vault list
- Parameters
Indicators dashboard
The dashboard indicators allow you to have an overview of the use of WALLIX Enterprise Vault in your company.
Each user who creates their account has a personal vault.
You also have an overview of the number of created Shared vault.
For each of them, you can see the number of items and the number of attachments.
You can see which client are used by your users.
Users list
Only users who have created their vault account are list in this screen. To create his vault account, a user have to connect to the vault and create his master password.
If a Trustelem administrator delete users or remove authorizations to access the Vault application, corresponding users are highlighted.
Administrators can force users to reset their master password or change their encryption key at the next connection. If the administrator delete the vault account by clicking the trash, user data cannot be recovered.
In this list you can check the status of the users. In the lifecylcelifecycle of Trustelem users, users with a Vault account can be unauthorized to access to the vault application or can be deactivated.
Shared vault list
The Shared vault list give you an overview of the Shared vault usage. You have a list of shared and for each the list of administrator and regular users.
When in the lifecycle of your users you have shared vault without active administrators or without any active users,user, a warning is displayed.
Settings
The settings page allows you to personalize of your enterprise vault according to your choices and security policies.
You have options to configure :
- Security and confidentiality
- Logs : choose logs to activate for your enterprise vault.
- Recovery : you can activate and configure recovery.