By Marybeth Alexander on Writing docs from June 10, 2014
Knowledge base software like HelpGizmo can be used to create both external and internal knowledge bases. External knowledge bases contain public-facing content for your customers to utilize, but really anyone with the link can access it. Internal knowledge bases are designed for employees or customers with the intent that ONLY they have access to this information by way of being a customer or employee. We call this restricted access.
In order to ensure that your online content is only available to certain individuals or groups, you can utilize a variety of security features to make sure your information is only available to that audience.
An IP address is unique identifier for the web which identifies the computer network and location. Many businesses and schools share a single or set of IP addresses so that all employees and students accessing the internet from that location share the same IP.
If you want to restrict access to your knowledge base to only employees or students, IP-based security will ensure that people can only access the information from a specified list of IP addresses.
A shared password ensures that only readers with the password can access your knowledge base. While it’s a good level of security, universal passwords can be easily shared and must be changed when you don’t want people who previously had the password to access the data, like a terminated employee.
Shared passwords can be used with IP-based restriction in two ways.
Don’t want your readers sharing the same password? Activate readers and you can create unique usernames and passwords for each individual reader or reader groups. Readers are powerful as you can define custom variables for each reader and use them to customize content within your knowledge base.
Reader logins provide more powerful administration options. For example, if an employee leaves the company, you can just delete their reader login rather than having to change the shared password and communicate this to all other employees. They also allow you more control over who can see and access what content.
If your employees or students are already logging into a separate system, you might not want to have to duplicate and manage credentials in two different systems. Many software products have begun utilizing Single Sign On or SSO technology to authenticate users using a system in which they are already set up. The benefit of this system is that you manage your users in a single location and ensure that only individuals with access to one system have access to the other.
Many people employ knowledge base software to create not only online knowledge bases but also online handbooks, manuals, training materials, documentation, and portals. For many of these people, they only want a certain audience to have access to this information. Security is a top-priority for them so it’s a top priority for us. Let us help you get your documentation online.
General posts useful to all documentarians about writing documentation, editing and publishing workflows, and more.
Your flight plan for how to get the most out of KnowledgeOwl features and integrate them into your workflows.
Major KnowledgeOwl company announcements.
Learn how others are using KnowledgeOwl & get pro tips on how to make the most of KO!
Find out more about who we are and what we value.
We believe good support is the foundation of good business. Learn about support tools and methodology.
Learn more about tools to solve various documentarian issues, within and beyond KnowledgeOwl.
Not sure what category you need? Browse all the posts on our blog.
Watch a 5-minute video and schedule time to speak with one of our owls.