Skip to main content

Organization Data Security Settings


In the Security module of the Organization Admin Console, you can centrally configure organization-level security settings. These include restricting the visibility range of Contacts, defining rules for users joining the organization, enabling screen watermarks, controlling whether attachments can be downloaded, configuring encryption policies, and password-free verification.

You can also manage whether regular members are allowed to create applications, API libraries, and develop plugins.

1. User Joining Rules

In Security > Contacts > Rules for user joining within the Organization Admin Console, administrators can centrally configure the approval for users joining the organization and required identity information fields.

  1. Approval Upon Joining

    The system applies different approval logic based on the invitation source and security policies:

    Enrollment Approval:
    When enabled, users invited by non-admin members must be approved by an administrator before joining the organization. When disabled, users can join directly after submitting their information.

    Approval-free Join:
    Invitations sent directly by administrators via specified phone numbers or email addresses allow users to join without approval after registration.

    Mandatory Approval:
    Users who request to join via a public invitation link or by searching the organization Door ID are always subject to administrator approval.

  2. Join via Organization Door ID

    Enabled:
    External users can find the organization by searching the Door ID and submit a join request.

    Disabled:
    Users cannot search or request to join the organization using the Door ID.

  3. Identity Information Collection

    Administrators can customize the fields that users must complete when applying to join the organization, such as department, job title, work location, and employee ID. These fields will be displayed on the application page.

2. Contacts Visibility Settings

In Org Admin > Security > Contacts > Contacts Visibility, administrators can flexibly configure members’ access to Contacts based on the organization’s privacy requirements.

Rule Description

The system provides the following three strategies to control Contacts visibility:

  • Restrict Viewing Other Departments

    Selected members can only view users and the structure within their own department. You can configure a whitelist (users exempt from restrictions) and specify additional visible departments or users.

  • Restrict Viewing All Users

    Restricted members cannot view any Contacts information within the organization (including users and department structure). You can specify “visible users” to support specific collaboration scenarios.

  • Hide from Everyone

    Completely hides specific users from the organization’s Contacts. Other members will not be able to search for these users when adding application members, inviting users to groups, or mentioning users (@) in record discussions.

    Note: This rule only supports configuration at the user level. Batch configuration by department or job title is not supported.

Scenario 1: Restrict Viewing Other Departments

Suppose Ross (in the R&D department) and members of the Sales department should not be able to view other departments, but are allowed to view members of the HR department and Fannie from the Marketing department. In this case, select the Restrict Viewing Other Departments rule.

  1. Create a new rule
  2. Under Only allow viewing own department Contacts, select Ross and the Sales department
  3. Under Additional visible members, add the HR department and Fannie

Whitelist

If the restriction applies to a department or organization role, you can designate a subset of users as a whitelist. Whitelisted users are exempt from the visibility restrictions.

For example, if the organization’s super administrator belongs to the Sales department, they should be added to the whitelist. Otherwise, the administrator would also be restricted, which may affect management efficiency.

Scenario 2: Restrict Viewing All Users

If agents have joined the organization, they are considered “colleagues” by default, meaning they can chat with each other and view Contacts. This is usually not desirable. You can use the Restrict Viewing All Users rule to prevent agents from accessing any Contacts information.

  1. Create a new rule
  2. Under All contacts in the organization cannot be seen, select the agent role via organization roles. If certain agents should not be restricted, exclude them using the whitelist
  3. Under Additional visible members, add specific users who should remain visible. All others will be hidden from the agents

Scope of Contacts Visibility Rules

  1. In Contacts, users and departments that are not visible will be hidden in both “All” view and department-based views
  2. In posts or record discussions, invisible users will not appear when mentioning (@) or selecting members
  3. In member selection dialogs, invisible users and departments will be hidden

Rule Priority

Individual vs. Department

Rules applied to individual members take precedence over rules applied to their department.

For example:

  • Rule 1: Jeff can view the HR department
  • Rule 2: Jeff’s department cannot view the HR department

Final result: Jeff can view the HR department.

Parent Department vs. Sub-department

  • Case 1: Only the parent department is selected

    If only the R&D department is selected, its sub-departments inherit the same visibility scope. Members in R&D Team 1, R&D Team 2, and the R&D department can only view Contacts within these departments.

  • Case 2: Both parent and sub-departments are selected

    If both the R&D department and R&D Team 1 are selected, R&D Team 1 follows its own rule.

    • R&D department can view: [R&D department, R&D Team 1, R&D Team 2]
    • R&D Team 1 can view: [R&D Team 1]
    • R&D Team 2 can view: [R&D department, R&D Team 1, R&D Team 2]

Users Belonging to Multiple Departments

  • If one department is not restricted, the user is not restricted

    Jeff belongs to both the Sales and Marketing departments. If the Sales department is restricted but the Marketing department is not, Jeff can still view all Contacts.
    → The most permissive scope applies.

  • If all departments are restricted, visibility is the union of all rules

    Jeff belongs to both the Sales and Marketing departments.

    • Rule 1: Sales department can additionally view the HR department and Jackson
    • Rule 2: Marketing department can additionally view the R&D department

    Final visibility: [HR department, R&D department, Jackson]

Member Information Display

Organization administrators can configure what information is shown when members view each other's profiles and business cards under Org Admin > Security > Account.

  • If a member sets their phone number or email as “Visible to myself only” in Account & Privacy, that information will not be visible to others.

  • When a member belongs to multiple departments or holds multiple positions, the system will display all associated departments and job titles.

The personal profile is primarily shown when viewing the Contacts or visiting the member’s post page:

Business card refers to the pop-up information layer shown when clicking a member’s avatar within the app.

  • Fields that are left empty will not be displayed.

  • The Department field supports two display modes:

    • Show only the department name
    • Show the full department path

Screen Watermark

To enhance enterprise data security, screen watermarks can be enabled on the organization management console, app views, and worksheet pages.

Enable / Disable Watermark

Organization admins can click the profile avatar and navigate to Org Admin > Security > Data & Access to toggle the watermark setting.

The watermark can include combinations of the user's name, phone number (last 4 digits), email, and organization name.
You can also input a custom fixed string—up to 20 characters.

Watermark Display

Where the Watermark Appears

Watermarks are shown on selected pages only:

  • All pages in the Organization Management Console

  • App pages where user data is displayed:

    • Home page
    • Record creation page
    • Record editing page
    • View pages (record list)
    • Custom pages

      Watermark is retained when custom pages are saved as images

    • User Management (including External Portal Management)
    • Workflow list page

Watermarks do not appear on form configuration or workflow configuration pages within the app.

Preview and download of images in attachments also support watermarking. Learn more

API Proxy

Organization administrators can configure an API network proxy to route API requests from internal apps through a designated proxy server.

Enable and Configure

Go to Org Admin > Security > Data & Access, and toggle on API Proxy. Then click Setting to configure the proxy information.

Note: If the proxy server is only configured for HTTP, HTTPS requests will bypass the proxy, and vice versa.

Where the Proxy Can Be Used

  • "Send API Request" node in workflows

  • API request settings in Integration Center

Field Encryption Rules

Some business data involves sensitive information that may require encryption, such as customer account numbers, ID numbers, bank card details, phone numbers, emails, and passwords. Once encrypted, the data is stored in ciphertext in the database and decrypted for display according to defined rules.

Create an Encryption Rule

Before applying encryption to fields, an organization admin must configure encryption rules.

To create a new encryption rule:

Go to Security > Data & Access > Encryption Rule to create and manage encryption rules.

Each rule includes the encryption method and encryption key. Multiple rules can use the same method.

HAP supports four encryption methods: AES128, AES192, AES256, and SM4.

Manage Encryption Rules

Each organization is automatically provisioned with a default encryption rule (using AES with a randomly generated key).
Super admins can create additional rules by specifying the encryption method and key.

  • System-generated rules cannot be modified or deleted
  • You can designate a default encryption rule
  • Rules can be enabled or disabled

For individual rules, you can edit the rule name or view all fields using that rule.

Apply Encryption Rules to Fields

Once encryption rules are configured, they can be applied to fields in a worksheet.

Learn more about field encryption

Feature Restrictions

Some features can be restricted to app administrators only, including:

  • Creating new apps
  • Deleting apps
  • Creating API connections
  • Developing plugins
  • Performing record search in Super Search

Go to Org Admin > Security > Feature > Member Feature Control to enable or disable each item in the popup window.

By default, all restrictions are disabled, meaning all members can access the features. When enabled, only app administrators can perform the corresponding actions.

When record search in Super Search is disabled, it is unavailable for all users.

8. Password-Free Verification Policy

In approval workflows and custom buttons, password verification can be configured for sensitive actions. If you want users to skip repeated password verification within a certain period (e.g., 1 hour) after successful verification, you can enable the password-free verification option.

In the Organization Admin Console, go to Security > Feature > Passwordless Policy to enable Operation Without Verification.

  • When enabled:
    For all custom buttons and approval workflows across the organization that require login password verification, users can choose to skip password verification for the next 1 hour after a successful verification.

  • When disabled:
    For all custom buttons and approval workflows that require login password verification, users must verify their password each time before proceeding.

Was this document helpful?