Data security

Database access

Sage XRT Common Services administration console enables you to define the management of user access rights for Sage XRT applications.

Definition of security policy through Sage XRT Common Services

Security Reporting

Sage XRT Common Services administration console enables you to edit reports listing the authorized/denied functions for each profile and each product from the platform.

Compliance with Sarbanes Oxley Act

The Sarbanes Oxley Act imposes security rules to get access to operating systems and applications.

Below is the list of security issues regarding access and use of Sage XRT applications for a standard user.

Sage XRT password policy complies with the requirement of the Sarbanes Oxley Act.

Security issues Sage XRT Advanced Sage XRT Treasury Sage XRT Comm/Sign Sage XRT Business Exchange (rich client) Sage XRT Business Exchange (web module)
The application manages profiles.
Passwords are mandatory.
A standard password is given to everyone or to a group upon account creation.
The password must be changed upon first connection.
Customizable

Customizable

Customizable

Customizable

Customizable
Passwords must contain at least 6 characters, among which 1 uppercase letter and 1 digit.
Customizable

Customizable

Customizable

Customizable

Customizable
Passwords must be changed every 42 Days.
Customizable

Customizable

Customizable

Customizable

Customizable
The application keeps the passwords history. The four last passwords cannot be used.
Customizable

Customizable

Customizable

Customizable

Customizable
Passwords are not kept to avoid new entry in later connections.

 = For a complete NT security, the Windows password is used. It is hidden to enable off-line connections.

 = For XRT standard security, the application password is not stored.

The password is locked after 3 unsuccessful entries. It is automatically reactivated after 10 minutes.
Customizable

Customizable

Customizable

Customizable

Customizable
The account is not locked if not used for several days.
The session is locked after 10-minute inactivity.
Period customizable
Security rules cannot be modified from user work station.
Every access to application must be logged.
For short-term contract users, the specification of an end date of validity is mandatory corresponding to the end date of contract.
Customizable

Customizable

Customizable

Customizable

Customizable