Authentication & User Management
Veritect AI uses a robust authentication system to ensure secure access to legal data.
Authentication Methods
1. Email/Password Authentication
- Standard login with email and password
- Password requirements:
- Minimum 8 characters
- At least one uppercase letter
- At least one number
- At least one special character
2. Single Sign-On (SSO)
- Google OAuth 2.0
- Microsoft Azure AD
- Custom SAML integration for enterprises
3. Two-Factor Authentication (2FA)
- SMS-based OTP
- Authenticator apps (Google, Microsoft)
- Backup codes for recovery
User Roles & Permissions
Admin Users
- Full system access
- User management
- Billing and subscription
- System configuration
- Analytics access
Legal Researchers
- Case law search
- Save searches and documents
- Create workspaces
- Export data
- API access (if enabled)
Associates
- Limited search access
- View shared documents
- Basic export features
- No API access
Clients (Read-only)
- View shared research
- Download reports
- No search access
- Limited to assigned cases
Access Control
IP Whitelisting
For enterprise customers:
{
"allowed_ips": [
"203.0.113.0/24",
"198.51.100.0/24"
],
"enforce_ip_restriction": true
}
Session Management
- Session timeout: 8 hours
- Concurrent sessions: 3 per user
- Device tracking and management
- Session invalidation on password change
API Authentication
API Key Generation
POST /api/v1/auth/generate-key
{
"name": "Production API Key",
"scopes": ["search", "read", "export"]
}
Using API Keys
curl -H "Authorization: Bearer YOUR_API_KEY" \
https://api.veritect.ai/v1/search
Security Best Practices
For Administrators
-
Regular Audits
- Review user access monthly
- Check for inactive accounts
- Monitor API usage
-
Password Policies
- Enforce password rotation (90 days)
- Prevent password reuse
- Use password complexity requirements
-
Access Reviews
- Quarterly access reviews
- Document access approvals
- Remove unnecessary permissions
For Users
-
Account Security
- Use strong, unique passwords
- Enable 2FA
- Don't share credentials
- Report suspicious activity
-
API Security
- Store API keys securely
- Rotate keys regularly
- Use environment variables
- Never commit keys to git
User Provisioning
Manual User Creation
- Navigate to Admin > Users
- Click "Add User"
- Fill in user details
- Assign appropriate role
- Send invitation email
Bulk Import
CSV format for bulk user import:
email,first_name,last_name,role,team
john.doe@lawfirm.com,John,Doe,researcher,litigation
jane.smith@lawfirm.com,Jane,Smith,associate,corporate
SCIM Integration
For automatic user provisioning:
- SCIM 2.0 compliant
- Supports user and group sync
- Real-time updates from identity provider
Troubleshooting
Common Issues
Account Locked
- After 5 failed attempts
- Auto-unlock after 30 minutes
- Admin can manually unlock
Password Reset
- Self-service via email
- Admin-initiated reset
- Temporary password expires in 24 hours
SSO Issues
- Verify SAML configuration
- Check attribute mappings
- Review SSO logs
Compliance
Data Protection
- GDPR compliant
- SOC 2 Type II certified
- ISO 27001 compliant
- Regular security audits
Audit Logs
All authentication events are logged:
- Login/logout
- Password changes
- Permission changes
- API access
- Failed authentication attempts
Access audit logs at: Admin > Security > Audit Logs