Security Center¶
The Security Center is a unified admin view for monitoring security activity and managing your own password. It brings together security alerts, login records, and account management in one place.
Role Required: Admin
You need the Admin role to access the Security Center.
What You'll Find Here¶
The Security Center has three tabs, each focused on a different aspect of security. All data is read-only except for password changes. You do not need to configure anything here -- it is a monitoring and account management tool.
Overview Tab¶
The Overview tab provides a high-level summary of security-related activity. It shows:
- Security alerts -- Notifications about unusual activity, such as a spike in failed login attempts
- Recent failed logins -- A summary of recent unsuccessful login attempts across all accounts
Use this tab as a quick health check. If you see a high number of failed login attempts for a specific account, it may indicate someone is trying to guess that user's password.
Login History Tab¶
The Login History tab provides a detailed record of all authentication events. Each entry includes:
- Event type -- Login (success), logout, or failed attempt
- Timestamp -- When the event occurred
- IP address -- The network address the request came from
This log is useful for investigating security incidents or verifying when a specific user last accessed the system.
Change Password Tab¶
The Change Password tab lets you update your own account password. Enter your new password and confirm it to save the change. This does not affect other users' passwords.
Tip
Change your password regularly, especially after your first login. For other users' passwords, use User Management.
System Configuration¶
System-level security settings such as MAC blocklist rules, rate limits, log retention policies, and wake retry counts are managed via environment variables and the backend API. There is no dedicated settings UI for these options in the current version.
If you need to adjust these settings, consult your system administrator or refer to the deployment configuration documentation.
Next Steps¶
- User Management -- Manage user accounts and roles
- Authentication -- Learn how sessions and password security work
- Audit Logging -- View the full record of all actions in the system