Security Settings
In the Security section of the Organization Management page, administrators can configure a wide range of security settings for the organization. These include:
- Restrictions on Contacts visibility
- Rules for joining the organization
- Screen watermarking
- Download permissions for attachments
- Encryption policies
- Password-free verification
You can also control whether regular users are allowed to create apps, API libraries, or develop plugins.
Rules for Joining the Organization
Navigate to [Org Admin] > [Security] > [Account] to define access rules when users join the organization, including approval policies and required identity information.

Approval Upon Joining
-
When approval is enabled:
If a non-admin invites someone via mobile number or email, the invited user must be approved by an organization admin after registration. -
Scenarios that never require approval:
If an organization admin invites a user via mobile number or email, the invitee joins the organization directly after registration—no approval needed. -
Scenarios that always require approval:
- When a user registers via a public invite link, approval is mandatory.
- When a user searches for the organization code to request access, approval is also required.
Joining via Organization Code
When enabled, users can search for your organization by entering the organization code and request to join.
When disabled, even if the organization code is known, users will not be allowed to request to join.
Required Information Upon Joining
You can configure mandatory fields that users must fill in when requesting to join the organization, such as:
- Department
- Job Title
- Employee ID
- Work Location
Set Contacts Visible to Members
Organization Admin can set which contacts are visible to members.

Set Rules
It is possible to set the following two kinds of rules:
-
Restricted from viewing contacts in other departments
Selected members can only view contacts in their department (including members and department structure). Organization Admin can also set whitelists and add members from other departments.
-
Restricted from viewing all contacts
Selected members cannot view all contacts in the organization, including members and department structure. Organization Admin can add some members to whom the contacts are visible.
Use Case
Example 1:Restricted from viewing contacts in other departments
Ross (in the R&D Dept.) and members of the Sales Dept. can't view contacts in other departments, but they can view members of the Personnel Dept. and Lan, the accountant in the Finance Dept.
-
Create a rule
-
Select Ross and Sales Dept. in [Only the contacts of this department can be viewed].
-
Add Personnel Dept. and Yao in [Additional visible members].

(It should be noted that the Finance Department that Lan belongs to is hidden, so Lan is only viewable in [All Contacts].)

Whitelist
If you choose to restrict a department or o-role, and select somne members to be whitelisted, then the whitelisted members are not restricted by the rules.
For example, if Super Admin belongs to the Sales Department, then Super Admin should be whitelisted, otherwise Super Admin will also be restricted from viewing.

Example 2: Restricted from viewing all contacts
If your agents joined the organization, they become colleagues and can chat and view contacts, which is generally not allowed. You can set a rule to restrict these agents from viewing pthers' contacts.
-
Create a rule
-
Select agents by o-role in [Restrict viewing of everyone]. If there are some agents that are not to be restricted, you can set a whitelist.
-
Add members visible to the agents in [Additional visible members], except these members, other contacts are not visible to the agents.

If hide some contacts
-
In [Contacts], if you view members by all or by department, the quarantined contacts will not be visible.
-
In posts or discussions, if you want to select and mention a member, the quarantined contacts will not be visible.
-
When adding members, the quarantined contacts and departments will not be visible.
Priority of Rules
1. For single member and the department they belong to
Rules for single members are prioritized over rules for their departments.
For example, if in Rule 1, Ross can view the Personnel Department, while in Rule 2, the Personnel Department is not visible to Ross's department.
In such case, Ross can view the Personnel Department.
2. For superior and subordinate departments
-
Setting 1: only the superior department is selected, not the subordinate department

As in the above rule, only the R&D Department is checked , then the R&D Department has the same permissions as the sub-departments, which means that the sub-departments can view the same contacts as the R&D departments. Members of Group 1, Group 2, and R&D Department are only able to view the contacts of these three departments.
-
Setting 2: Both superior and subordinate departments are selected

As above, both R&D Department and Group 1 are checked, then Group 1 follows its own rules.
Members visible to R&D: [R&D Department, Group 1, Group 2]
Members visible to Group 1: [Group 1]
Members visible to Group 2: [R&D, Group 1, Group 2]
3. If a member belongs to more than one department
-
If one of the departments to which the member belongs is not restricted, the member is not restricted.
For example, if Ross belongs to both Sales and Marketing Departments, and the Sales Department is restricted but the Marketing Department is not, Ross can still view all contacts.
-
If the departments to which the member belong are all restricted, the visible range is the union of rules.
Rule 1: The Sales Department can view the Personnel Department and Lily.
Rule 2: The Marketing Department can view R&D Department.
So the final visible range for Ross is [Personnel Department, R&D Department, Lily].
Member Information Display
Organization administrators can configure what information is shown when members view each other's profiles and business cards under [Org Admin] > [Security] > [Account].
-
If a member sets their phone number or email as “Visible to myself only” in [Account & Privacy], that information will not be visible to others.
-
When a member belongs to multiple departments or holds multiple positions, the system will display all associated departments and job titles.

The personal profile is primarily shown when viewing the Contacts or visiting the member’s post page:

Business card refers to the pop-up information layer shown when clicking a member’s avatar within the app.
-
Fields that are left empty will not be displayed.
-
The Department field supports two display modes:
- Show only the department name
- Show the full department path

Set Watermark
In order to protect enterprise information, you can enable watermarks on the organization management page, in views and worksheets.
1. Enable/Disable
Super Admin clicks the profile photo and goes to [Org Admin] > [Organization] > [Security] to enable or disable the watermark.

2. Watermark Display
The watermark is the current user's name and the last four digits of mobile phone number, or the name and email prefix if no phone number is bound.

3. Where watermarks to be shown
The watermark is not showed on all pages, but on the following pages:
-
All pages of background management of the organization
-
Pages that display user data in the application
- Homepage
- The page of adding records
- The page of editing records
- View (page of record lists)
- Custom page
- User management page (including external portal management page)
- Workflow lists
There is not a watermark on the pages for configuring forms and workflows in the application.
Show watermark when previewing and downloading files
Set Encryption Rule
Some of the business data are relatively private and may need to be encrypted, such as customer account, ID number, phone number, mailbox, password, etc.
This feature is only available in the Ultimate Edition.
Before encrypting the fields, configure the encryption rules first.
New Encryption Rule
Entrance to Create Rule:

New Rule:

Encryption rules include encryption methods and keys. The same encryption method can be added multiple times.
There are 3 encryption methods: AES128, AES192, AES256.
Rules Management
A default encryption rule is automatically created for each organization (encryption method is AES, and the key is randomly generated). Super Admin in the organization can create more encryption rules (set encryption method and key).
- Encryption rules created by the system cannot be modified or deleted.
- Default encryption rules can be set.
- Encryption rules can be turned on or off.

For a single encryption rule, you can modify the name, or view the fields that this rule acts on.

Enable Encryption Rules for Fields
Once encryption rules are created, you can enable them for specific fields in a worksheet.
Learn more about field encryption

API Proxy
Organization administrators can configure an API network proxy to route API requests from internal apps through a designated proxy server.
Enable and Configure
Go to [Org Admin] > [Security] > [Data], and toggle on API Proxy. Then click Setting to configure the proxy information.
Note: If the proxy server is only configured for HTTP, HTTPS requests will bypass the proxy, and vice versa.

Where the Proxy Can Be Used
-
"Send API Request" node in workflows
-
API request settings in Integration Center
Feature Restrictions
Some features can be restricted to app administrators only, including:
- Creating new apps
- Deleting apps
- Creating API connections
- Developing plugins
- Performing record search in Super Search
Go to [Org Admin] > [Security] > [Misc.] > [Feature Restrictions] to enable or disable each item in the popup window.
By default, all restrictions are disabled, meaning all members can access the features. When enabled, only app administrators can perform the corresponding actions.
When record search in Super Search is disabled, it is unavailable for all users.

Passwordless Verification
You can allow passwordless operations within approval flows or custom buttons after the user has authenticated once within 1 hour.
-
When enabled:
Users can check the option "Skip password verification within 1 hour" after verifying once, applicable across all approval and custom button operations that require login password. -
When disabled:
Password verification will be required every time before performing such operations.
