Access controls
Bloomreach Engagement has implemented authentication and access controls in order to introduce another layer of security to the production environment, internal drive, and data protection. Such an authentication mechanism is ensured by either a Bloomreach Engagement SSO, for authorization and authentication, or a combination of access credentials/Google login and 2FA, for authentication. Access to internal tools and data is only granted on a granular basis and the principle of least privilege is followed. Sign-up invitations expire after 7 days, giving the administrators further control over access to the application.
Within the Bloomreach Engagement Application access to different types of data and tools can be controlled within our Access Management. You can read more on this in the Access minimization section.
Updated 12 months ago