Skip to main content

Policy Management

The Policy Management module allows administrators to configure targeted rules for specific use cases. IAM supports a variety of policy types—such as data masking, unique user rules, password policies, lockout rules, notification templates, and default app redirects—enabling enterprises to meet complex operational and security requirements.

Unique User Identifier

Configure policies to enforce user uniqueness based on custom attributes.

No.ConfigurationDescription
1User GroupDefined in Identity Management > Group Management.
2Optional FieldsSelect active attributes from the idt_user table in System Settings > Metadata.
If multiple attributes are added, uniqueness is validated using an AND logic.

Common Use Cases

No.ScenarioDescription
1Create UserWhen creating a user, IAM checks if the selected fields are unique. If not, the operation fails.

Example:

  1. A policy is created for Group A with attributes a and b.
  2. A new user X is added to Group A.
  3. IAM checks for unique combination of a and b. If not unique, creation fails.

User Profile Completion

Requires the [CIAM] module.

This policy ensures that users complete required fields during login if their profiles are incomplete.

No.ConfigurationDescription
1ApplicationApplications defined in Application Management > App Configuration.
2Scope TypeChoose from:
- User Group (Group Management)
- User Type (User Type)
- All Users
3Scope SelectionSelect group/type as per scope type.
4Required FieldsSpecify which fields users must complete.
5Linked PageSelect a page from Customization > Form Designer. A default form (e.g., email) is available.

When Triggered

No.ScenarioDescription
1User LoginOn login, if required fields are missing, user is redirected to complete them.

Priority

If a user matches multiple policies, the one with the highest priority (lowest sort order) takes effect.

Example

  1. Configure a form in [Form Designer] for name, email, and mobile.
  2. Create a policy for App A and apply it to "All Users".
  3. Create User A without name/email/mobile.
  4. Assign an account for App A to User A.
  5. When User A logs in to App A, IAM prompts for profile completion via the configured form.

Password Policy

IAM allows enterprises to define rules for password strength, expiry, recovery options, and initial password generation.

Password Rule

No.ConfigurationDescription
1User GroupFrom Group Management.
2Custom RulesDefine allowed characters, length, exclusions (e.g., spaces, repeats).
Advanced: Use regex for custom patterns.
3Password TesterTest a password against the current rule set.
4Login BehaviorDefine behavior when login password does not match rule.
5LifecycleSet password validity period and expiration alerts.
6Recovery OptionsSet how users can reset/recover passwords.

Password Rule Enforcement

No.ScenarioDescription
1LoginCheck rule compliance, expiry status.
If forced, prompt user to update.
2NotificationsNotify users X days before expiry (via email or popup).
3Password ResetApply rules when users attempt to reset.
4Password ChangeValidates against the configured rules.

Priority: Higher number = higher priority. If a user belongs to multiple groups, the highest priority rule applies.


Initial Password Rule

Defines how initial passwords are generated for new users.

No.ConfigurationDescription
1User GroupDefined in Group Management.
2Password StrategyUse SQL-based expressions to generate dynamic initial passwords.

Priority: Highest-priority rule (largest value) takes precedence.


Account Lockout

Configure policies to lock users after a defined number of failed login attempts.

Common Use Case

No.ScenarioDescription
1User LoginLocks the account if failed login attempts exceed the threshold.

Priority: Higher number = higher priority when multiple policies apply.


Data Security

Display Masking

Used to mask sensitive user attributes (e.g., display phone as 130****1234).

No.ConfigurationDescription
1Applicable RolesRoles defined in Platform Permissions > Role Management.
Note: A user must have only roles with masking applied for the policy to be enforced.
2Masking MethodSupports: Nullify, Random Value, Replace.
3Masking RangeDefine which characters to mask (e.g., first 5 digits, last character, etc.).
4View PlaintextAllow users to view original value via an "eye" icon (audited).

Example: Masking Behavior

No.ScenarioDescription
1View Masked DataUsers see masked data; can click the “eye” to reveal (audited).
2View AuditAudit logs record reveal actions.

Masked Field Example
Audit Example


Storage Encryption

Encrypt selected fields before storing in the database.

⚠️ Notes:

  1. Encrypted fields cannot be sorted or searched via fuzzy matching.
No.ConfigurationDescription
1Encrypted FieldsSelect user attributes to encrypt.
2Encryption AlgoConfigured in System Settings > Security > Field Encryption.

Effect: During user creation/editing, encrypted fields are stored using the configured algorithm.

Deletion: Deleting the encryption policy decrypts affected fields.


Notification Policies

The notification module allows configuration of messages, channels (email, SMS, WeCom, etc.), and recipients based on predefined scenarios.

Notes:

Common Notification Codes

CodeScenario Description
outer_verify_code_loginSend OTP during login or step-up authentication.
outer_unbind_password_backOTP for self-service unbinding.
outer_bind_password_backOTP for self-service binding.
outer_forget_passwordOTP for password recovery.
send_sms_codeGeneric OTP dispatch.
user_add / disable / enableNotification for user lifecycle events.
user_expired / will_expireExpiration alerts.
notice_empty_accountPlatform orphan account alert.
notice_zombie_account_*Alerts for inactive or duplicate accounts (platform/app level).
mfa_risk_alertAlert admins when MFA risk is triggered.
mfa_operation_warning_alertAlert for suspicious MFA behavior.
send_offline_otp_codeOffline OTP dispatch.
sync_first_level_error_to_adminSync failure alerts (full failure).
sync_info_to_adminSync partial failure alerts.

Configure Notification Policy

  • Choose scenario.
  • Set recipients, channel(s), and message template.
  • Variables must be formatted as ${}.

Example Setup

  1. Upload plugins via System Settings > Plugin Management (optional if using built-in).
  2. Configure interface in Customization > Notification Methods.
  3. Adjust parameters in System Settings > System Parameters.
  4. Define template content and target recipients.

Notification Config

SettingDescription
Send MethodDetermines eligible delivery channels for the notification.
BroadcastIf set to 0, only SMS is effective—even if other methods are selected.

Default Application

Define a landing application for specific user groups after login.

No.ConfigurationDescription
1User GroupDefined in Group Management.
2Redirect URLURL to redirect after successful login instead of the default portal.

Multi-Device Policy

Controls whether the same user account can log in from multiple devices simultaneously.

No.ConfigurationDescription
1PriorityHigher number = higher priority.
2User ScopeCan be scoped by user, user type, organization, position, or role.
3Concurrent Device PolicyOptions:
1. Allow concurrent logins on multiple devices.
2. Disallow (PC/mobile tracked separately).
Note: PC and mobile are treated as separate categories.

Enforcement Behavior

No.ScenarioDescription
1User LoginSystem determines device concurrency status and applies rules accordingly.