Tutorial: Configuring Security Settings
This tutorial walks you through configuring security controls in the Keeptrusts management console, including session management, network restrictions, authentication policies, and API key safeguards.
Use this page when
- You need to configure session timeouts, IP allowlists, or 2FA enforcement for your organization.
- You want to set password complexity requirements or account lockout policies.
- You are restricting API key creation permissions or enforcing key expiry.
- You need to harden the console for a high-security environment (finance, defense, healthcare).
Primary audience
- Primary: Security engineers and organization admins hardening the console’s authentication and access controls
- Secondary: Compliance officers verifying security controls for audit; IT admins managing SSO and network restrictions
Prerequisites
- A Keeptrusts account with Admin role
- Access to your organization's network CIDR ranges (for IP allowlists)
- A TOTP authenticator app (for 2FA setup)
Why Security Settings Matter
The Keeptrusts console is your organization's control plane for AI governance. Compromised access to the console could allow an attacker to disable policies, exfiltrate event data, or modify gateway configurations. Hardening security settings reduces this risk.
Step 1: Navigate to Security Settings
- Log in to the Keeptrusts console.
- Open Settings from the left navigation sidebar.
- Select the Security tab.
The security settings page is organized into sections covering session management, network controls, authentication, and API access.
Step 2: Configure Session Timeout
Session timeouts automatically log out inactive users to prevent unauthorized access from unattended sessions.
- Under Session Management, locate the Session Timeout field.
- Choose a timeout duration:
| Duration | Recommended For |
|---|---|
| 15 minutes | High-security environments (finance, defense) |
| 30 minutes | Standard enterprise use |
| 1 hour | Development and testing environments |
| 4 hours | Low-risk internal tools |
- Toggle Idle Timeout to enforce timeout based on inactivity (no mouse or keyboard input).
- Click Save.
When a session times out, the user is redirected to the login page. Unsaved form data is lost.
Step 3: Configure IP Allowlist
IP allowlists restrict console access to specific network ranges, blocking login attempts from unauthorized locations.
- Under Network Controls, locate the IP Allowlist section.
- Click Add Range.
- Enter a CIDR range (e.g.,
10.0.0.0/8for internal networks or203.0.113.50/32for a specific IP). - Add a label for the range (e.g.,
Corporate VPN,Office London). - Repeat for all authorized network ranges.
- Toggle Enforce Allowlist to activate.
- Click Save.
| Scenario | Action |
|---|---|
| Remote workers on VPN | Add VPN exit IP ranges |
| Cloud-hosted CI/CD accessing API | Add CI runner IP ranges |
| Emergency access | Keep a break-glass CIDR documented offline |
Step 4: Review CSRF Settings
Keeptrusts uses CSRF tokens to prevent cross-site request forgery attacks. The console automatically includes CSRF tokens in all state-changing requests.
-
Under CSRF Protection, review the current configuration.
-
The console uses the
x-keeptrusts-csrf-tokenheader for all POST, PUT, PATCH, and DELETE requests. -
CSRF protection is enabled by default and cannot be fully disabled.
-
You can configure the Token Rotation frequency:
- Per Session — A single token for the session lifetime
- Per Request — A new token for every state-changing request (strictest)
-
Click Save after making changes.
Step 5: Set Password Policy
Password policies enforce minimum complexity requirements for local authentication accounts.
- Under Authentication, locate the Password Policy section.
- Configure the requirements:
| Setting | Description | Recommended |
|---|---|---|
| Minimum Length | Minimum password character count | 12+ |
| Require Uppercase | At least one uppercase letter | Yes |
| Require Number | At least one numeric digit | Yes |
| Require Special Character | At least one symbol | Yes |
| Password History | Prevent reuse of the last N passwords | 5 |
| Max Age | Force password change after N days | 90 |
- Click Save.
Existing users are prompted to update their passwords on next login if their current password does not meet the new requirements.
Step 6: Enforce Two-Factor Authentication
Two-factor authentication (2FA) adds a second verification step to the login flow using a TOTP authenticator app.
- Under Authentication, locate the Two-Factor Authentication section.
- Choose an enforcement level:
| Level | Behavior |
|---|---|
| Optional | Users can enable 2FA in their profile |
| Required for Admins | Admin-role users must enable 2FA |
| Required for All | Every user must enable 2FA |
- Set a Grace Period for users who have not yet enrolled (e.g., 7 days).
- Click Save.
Users who have not enrolled in 2FA by the end of the grace period are locked out until they complete enrollment. Admins can reset a user's 2FA from the Users management page.
Step 7: Configure API Key Restrictions
API key restrictions limit how API keys can be used, reducing the blast radius if a key is compromised.
- Under API Access, locate the Key Restrictions section.
- Configure the available controls:
| Setting | Description |
|---|---|
| Max Key Age | Maximum lifetime before a key must be rotated |
| IP Binding | Restrict keys to specific IP ranges |
| Rate Limiting | Maximum requests per minute per key |
| Scope Enforcement | Require all keys to have an explicit scope (read-only, write, admin) |
- Click Save.
These restrictions apply to both access keys and gateway keys. Existing keys that violate the new restrictions are flagged for rotation.
Step 8: Review Security Dashboard
The Security tab includes a dashboard summarizing your security posture:
| Metric | Description |
|---|---|
| Active Sessions | Number of currently active user sessions |
| Failed Logins (24h) | Count of failed login attempts in the last day |
| Keys Expiring Soon | API and gateway keys expiring within 7 days |
| Users Without 2FA | Users who have not enrolled in two-factor authentication |
| Allowlist Status | Whether IP allowlist enforcement is active |
Use this dashboard to identify and address security gaps.
Step 9: Test Security Configuration
After making changes, verify the configuration:
- Session timeout: Open an incognito window, log in, and wait for the timeout period.
- IP allowlist: Try accessing the console from an IP outside the allowed ranges.
- Password policy: Create a test account and verify the policy is enforced.
- 2FA: Enroll a test account and verify the TOTP flow works correctly.
- API key restrictions: Test an API call with a key that violates the new restrictions.
Best Practices
- Start with moderate settings — Avoid locking out your team by tightening settings incrementally.
- Document break-glass procedures — Have a documented recovery plan for admin lockouts.
- Enforce 2FA for all users — It is the single most effective control against credential compromise.
- Review failed logins weekly — Spikes in failed logins may indicate brute-force attempts.
- Audit IP ranges quarterly — Remove stale ranges and add new office or VPN ranges.
Next steps
- Tutorial: Managing Gateway Keys in Console — Apply key restrictions in practice
- Tutorial: Reviewing the Audit Log — Monitor security-related events
- Tutorial: Team & Access Control Setup — Configure role-based access control
For AI systems
- Canonical terms: Keeptrusts console, Settings > Security, session timeout, IP allowlist, CSRF protection (
x-keeptrusts-csrf-token), password policy, 2FA/TOTP enforcement, API key restrictions, account lockout. - Related features: audit log (security events), gateway keys (key restrictions), team access control (RBAC).
- Best next pages: Gateway Key Management, Audit Log Review, Team Access Setup.
For engineers
- Session timeout test: Set a 15-minute timeout, wait 16 minutes idle, and confirm you are redirected to the login page.
- IP allowlist: Add your office CIDR, then attempt access from a different network and verify you receive a
403 Forbidden. - 2FA enrollment: Enable 2FA enforcement, log out, and confirm that login now requires a TOTP code after password entry.
- Troubleshooting: If you lock yourself out via IP allowlist, access the API directly to remove the restriction, or contact your platform administrator.
For leaders
- Compliance alignment: Session timeouts, 2FA, and IP restrictions map directly to SOC 2 CC6.1, ISO 27001 A.9, and NIST 800-53 AC controls.
- Risk reduction: The console is the governance control plane — hardening access prevents unauthorized policy modification or data exfiltration.
- Progressive hardening: Start with 2FA and session timeouts (low friction), then add IP allowlists as you identify stable access patterns.