Security & Logging
Qanapi provides comprehensive security features and detailed logging capabilities to help you protect your data and maintain compliance with regulatory requirements.Security Features
Accessing Security Settings
To access security settings:- Log in to your Qanapi dashboard
- Click on Security in the left navigation sidebar
- The Security page displays various security settings and features for your organization
Authentication Settings
Two-Factor Authentication (2FA)
Qanapi supports multiple 2FA methods to enhance account security:Enabling 2FA for Your Account
- Navigate to your Profile Settings by clicking on your name in the top-right corner
- Select the Security tab
- Click Enable Two-Factor Authentication
- Choose your preferred 2FA method:
- Authenticator App (Google Authenticator, Authy, etc.)
- SMS Verification
- Email Verification
- Security Key (WebAuthn/FIDO2)
- Follow the on-screen instructions to complete the setup
Requiring 2FA for All Team Members
As an Administrator or Owner, you can require 2FA for all team members:- Navigate to the Security page
- In the Two-Factor Authentication section, toggle on Require 2FA for all users
- Choose whether to give users a grace period to set up 2FA
- Click Save Changes
Single Sign-On (SSO)
For Enterprise customers, Qanapi supports SSO integration with popular identity providers:Configuring SSO
- Navigate to the Security page
- In the Single Sign-On section, click Configure SSO
- Select your identity provider:
- Okta
- Azure AD
- Google Workspace
- OneLogin
- Custom SAML 2.0
- Follow the provider-specific setup instructions
- Validate the configuration with a test login
- Enable SSO for your organization
Session Management
Control user session duration and provide options for session termination:- Navigate to the Security page
- In the Session Management section, configure:
- Session timeout (1 hour to 2 weeks)
- Concurrent session limits
- Auto-logout on browser close
- Click Save Changes
API Security
API Key Management
Control API key creation and usage:- Navigate to the Security page
- In the API Security section, configure:
- Maximum API keys per project
- API key expiration policy
- IP restrictions for API access
- Click Save Changes
API Rate Limiting
Prevent abuse by configuring rate limits:- Navigate to the Security page
- In the Rate Limiting section, configure:
- Request limits per minute/hour/day
- Custom rate limits by project or API key
- Rate limit response behavior
- Click Save Changes
Network Security
IP Restrictions
Restrict dashboard access to specific IP addresses or ranges:- Navigate to the Security page
- In the IP Restrictions section, click Add IP Restriction
- Enter IP addresses or CIDR notation ranges
- Specify whether the restriction applies to dashboard access, API access, or both
- Click Save
Traffic Filtering
Configure traffic filtering for your Qanapi instance:- Navigate to the Security page
- In the Traffic Filtering section, configure:
- Allowed countries
- Blocked IP ranges
- Connection throttling settings
- Click Save Changes
Logging & Monitoring
Security Event Log
The Security Event Log records all security-relevant activities in your organization:- Navigate to the Security page
- Click on the Security Event Log tab
- View events filtered by:
- Event type (login attempts, setting changes, etc.)
- Date range
- User
- IP address
- Success/failure status
Configuring Log Destinations
Qanapi allows you to send logs to external systems for monitoring and analysis:- Navigate to the Security page
- Click on the Log Destinations tab
- Click Add Log Destination
- Choose a destination type:
- SIEM (Splunk, LogRhythm, QRadar)
- Log Management (Datadog, New Relic, Sumo Logic)
- HTTPS Webhook
- AWS CloudWatch
- Azure Monitor
- Google Cloud Logging
- Configure the connection details for your chosen destination
- Select which event types to forward
- Click Test Connection to validate the setup
- Click Save
Different log destination types may require specific credentials or API keys. Ensure you have these ready before configuration.
Audit Log Retention
Configure how long your audit logs are retained:- Navigate to the Security page
- In the Audit Log Settings section, select your retention period:
- 30 days (default)
- 90 days
- 180 days
- 365 days
- Custom retention period (Enterprise plans only)
- Click Save Changes
Compliance Reporting
Generating Compliance Reports
Qanapi provides built-in compliance reporting to assist with regulatory requirements:- Navigate to the Security page
- Click on the Compliance Reports tab
- Select the report type:
- Access Activity Report
- Security Configuration Report
- Data Classification Usage Report
- API Key Usage Report
- Specify the date range
- Click Generate Report
- Download the report in PDF or CSV format
Scheduled Reports
Set up automatic report generation and delivery:- Navigate to the Compliance Reports tab
- Click Schedule Reports
- Configure:
- Report type
- Frequency (daily, weekly, monthly)
- Recipients
- Delivery method (email, webhook, storage)
- Click Save Schedule
Security Alerts
Configuring Security Alerts
Set up notifications for suspicious or important security events:- Navigate to the Security page
- Click on the Alerts tab
- Click Add Alert
- Select the event types to trigger alerts:
- Failed login attempts
- API key creation or deletion
- Permission changes
- Configuration changes
- Unusual access patterns
- Configure notification methods:
- SMS
- Webhook
- Slack
- Specify recipients
- Click Save Alert
Security Best Practices
For optimal security with Qanapi:- Enable 2FA for all team members
- Implement SSO if available in your plan
- Use IP restrictions to limit access to trusted networks
- Rotate API keys regularly
- Monitor security logs for unusual activity
- Configure external log destinations for permanent audit records
- Set up alerting for critical security events
- Review user access and permissions regularly
- Utilize data classifications to enforce access controls
- Keep your browser and systems updated to prevent vulnerabilities