74 results found
-
1 vote
-
2FA - Remember the log in settings
2FA : it should remember my settings. Right now, there are 8 clicks to log in. I just want to put in the passwords and 2FA, not biometric. Would be nice for it to remember how we want to log in. Too many clicks. It keeps showing me all the options every single time
9 votes -
anti abuse mechanism needs to list offending account
I keep getting a message that says I should buy another license. The KB leads me to believe this message appears when techs log in from multiple locations at the same time. I would like to see a list of the offending accounts.
3 votes -
Ability to disable prompt for biometric setup
I would like the option to permanently stop Atera from asking me to set up biometric logins. I already reset my mfa because it was a significant number of clicks to skip the biometric login and use TOTP instead. Now that I have done this, it still requires an excessive number of clicks to login to the admin console because you have to dismiss the requests to set up biometric login.
5 votes -
Hexnode mobile, Desktop & IOT management software
Integration with Hexnode solutions. It offers Unified mobile, Desktop & IOT management.
1 vote -
Personal Password Store
The possibiliy to store personal passwords of technicians also for themselves - passwords that only the technician should know (personal passwort safe) for Logins on 3rd party portals for example
4 votes -
MFA\2FA option within the password records
Hi,
If we store our customer's 365 tendency log-in details, we would like to see an option to set up the MFA\2FA and generate the MFA code so that we can improve the security of our customer's accounts.
7 votes -
Script to change domain admin password
Ability or script to change and domain admin password or add a domain admin user / password.
4 votes -
notification on shell usage
A e-mail notification (maybe with an authentication code) when remote shell actions get executed by a user or process. This way if ever a user account gets hacked they are unable to directly execute actions on the system without user interaction.
4 votes -
2FA Trusted Devices - Permanent.
Have a checkbox for permanently trust this device.
2fa on a phone is completely redundant. If somebody steals my phone and hacks my password, then they instantly have access to my authentication app to access the atera app anyway. Not very well thought through and pointless having to do it even once a week.
The only application I can possibly think of is an employee that leaves, in which case their access could be revoked through the portal anyway.
31 votesNice! The feature you requested is being reviewed by our product team. We’ll keep an eye on the number of votes, and let you know if a decision is reached to implement. Thank you for being a partner in our process!
-
Identify which devices have successfully authenticated using your Atera Account
Splashtop users will be aware of this feature already however, you can check which devices have been successfully authenticated and have logged into your Splashtop Account. In Atera, you can check your Activity log which will show what IP Addresses the user has successfully logged in from however, it's not particularly useful in identifying that your Atera account is secure. Given the damage that can be done if your Atera account is compromised, I think it would be reassuring that the devices using your account are easily identifiable.
What's your thoughts?
2 votes -
Option to colour mark passwords for easier filtering.
I think if Customer / Client passwords had the option of selecting colour marking for passwords would be great for technicians to filter through for what they need.
Or the option to add filters to the passwords section.
1 vote -
Possibility to disable APIs.
The API allows, among other things, to retrieve information from conversations. If confidential data is stored in the conversations, it could be a serious cybersecurity issue (Password). API calls should be authenticated and, in my opinion, API calls should be restricted to only certain public IPs. As with the portal login, which has this option. We could even rely on the same IPs that are allowed to authenticate to the portal. Authentication + IPs = security
0 votes -
0 votes
- Don't see your idea?