RelativityOne Security Center

As organizations workforces are increasingly dispersed, you want to be sure you’re keeping your data secure. Security Center provides a single-threaded view into the most pressing areas of concern for securing your data. 

These areas include:

  • User 2-factor Authentication - 2-factor authentication (2FA) provides an additional layer of protection in the event that passwords are compromised. In Security Center, admins have the ability to track two-factor authentication usage and send users notifications to enable 2FA to make sure user endpoints are secure.
  • Login Map - the Login Map provides you with insight into where your users are accessing data from. You will be able to see logins across geographies and identify calls to action, such as logins that do not currently have 2-factor authentication set up.
  • User Activity - Security Center provides insight into the status of inactive users and allows you to disable or delete them to ensure your data is secure.
  • Lockbox access - transparency and trust are two core tenants of the security program at Relativity. Lockbox in RelativityOne ensures that Relativity support staff only have access to your workspaces when you give it to them. In Security Center, you can do real-time access audits of Lockbox/Relativity support and revoke access if needed.

Note: Only RelativityOne System Administrators have access to the Security Center dashboard.

This page contains the following information:

Security Center dashboard

The dashboard in Security Center includes the following charts:

  • 2FA Enabled Users - this pie chart displays the percentage of users that have 2-factor authentication (2FA) enabled and the percentage that do not in your Relativity instance. When you click on a section of the chart, the User 2-factor Authentication section below is filtered to display users matching your selection.
  • User Activity - this pie chart displays the percentage of users that are active and the percentage that are inactive (i.e., haven't logged in for 30+ days) in your Relativity instance. When you click on a section of the chart, the User Activity section below is filtered to display users matching your selection.
  • Lockbox Access - this pie chart displays the percentage of workspace that are accessible to Relativity staff and the percentage that do not grant Relativity staff access in your Relativity instance. When you click on a section of the chart, the Lockbox Access section below is filtered to display users matching your selection.

User 2-factor authentication

2-factor authentication (2FA) provides an additional layer of protection in the event that passwords are compromised. In Security Center, admins have the ability to track two-factor authentication usage and enforce 2FA to make sure user endpoints are secure.

The User 2-factory Authentication section displays a list of users, their email addresses, and whether they have 2FA enabled.

Notifying users who do not have 2-factor authentication (2FA) enabled

To send a system generated email to users who do not have 2-factor authentication enabled:

  1. In the User 2-factor Authentication section, select the checkbox to the left of the Artifact ID for users you want to notify.
  2. Note: The checkbox will only display for users that do NOT have 2-factor authentication enabled (i.e., 2FA Enabled is set to No). You can filter this list either using the 2FA Enabled Users chart above, or through the standard Relativity column filters and sorting functionality.

  1. Click Notify from the pull-down menu below the table. A window will display asking you to confirm whether you want to notify the selected users via email.
  2. Click Notify again.
  3. A confirmation window displays and a system-generated email will be sent to the selected users advising them to enable it. You will also receive a confirmation email at your listed Relativity user email address.

  4. Click Close to close the confirmation window.

Enforcing 2-factor authentication (2FA)

To enforce 2-factor authentication for users:

  1. In the 2-Factor Authentication section, select the checkbox to the left of the Artifact ID for users.
  2. Note: The checkbox will only display for users that do NOT have 2-factor authentication enabled (i.e., 2FA Enabled is set to No). You can filter this list either using the 2FA Enabled Users chart above, or through the standard Relativity column filters and sorting functionality.

  3. Click Enforce 2FA from the pull-down menu below the table.

    A window will display asking you to choose the method of enforcing 2FA for the selected user(s) Default Password Provider login method.

  4. Choose from the following 2FA Mode options:
    • Always required - 2FA will always be required for the selected user(s) Default Password Provider login method.
    • Required only for non-trusted IPs - 2FA will be required for login with non-trusted IPs for the selected user(s) Default Password Provider login method after defining trusted IP ranges.

    Note: See the section on Password Outside Trusted IP in Authentication documentation.

  5. Choose a Method for enforcing 2FA.
    • Authenticator App - Enable Two-Factor Authentication will be set to True for the selected user(s) Default Password Provider login method. For authenticator app, users will follow the instructions on the app or enter the app's passcode. You will also receive a confirmation email at your listed Relativity user email address.
    • Email - For email, the system will email a passcode to the user during logon, and it's different each time. You will also receive a confirmation email at your listed Relativity user email address.

      Note: The link in the email sent to users is valid for 5 minutes, and only the most recently-sent email can be used. The link expiration time is not configurable. See the section on Two-factor authentication in Authentication documentation for more information.

  6. Click Enforce 2FA again.
  7. A confirmation window displays.

  8. Click Close to close the confirmation window.

Login map

The Login Map provides you with insight into where your users are accessing data from. You can review a 7-day summary of Relativity user logins across geographies and identify calls to action, such as examining logins that do not currently have 2-factor authentication or SSO set up.

Refer to the following for more information:

Login map controls

Controls Icon Description
Home button Clicking the Home button returns you to the initial view of logins across the world.
+/- button
mouse scroll button
Click on the country or use your mouse's scroll button to zoom in or out on the view for the selected area or use the + or - control on the map.
Login clusters

The circles graphically depict geographical clusters of logins for your instance of Relativity.

  • Red - <50% of logins are 2FA or SSO.
  • Yellow - 50-99% of logins are 2FA or SSO.
  • Green - 100% of logins are 2FA or SSO.

Clicking on a circle will zoom in on that cluster of login data.

7-day login summary key - Displays the number and percentage of your organization's logins that are 2FA-enabled (e.g., 29 out of 50 2FA-enabled (58%) for North America).

Using the login map

The initial view is across the entire world and displays a key with a login summary for each of the major geographical areas (e.g., North America, Europe, Asia). Circles are shown for each of these major geographical areas that visually depict these geographical clusters of logins.

To drill down on the displayed login data:

  1. Click on the cluster shown for a geographical area (e.g., North America) to zoom in on the selected geographical area's data (e.g., the United States and Canada).

  2. Click on a cluster for a country to zoom in and show multiple clusters of data within that country (e.g., clicking on the cluster for the US will display login data for states within the US).

  3. Click again on one of the clusters shown within a state/province within a country to zoom in and show clusters of login data by city (e.g., clicking on the cluster for Illinois will display login data for cities within Illinois).

  4. Click again on one of the clusters shown within a city to show individual user logins within each city (e.g., clicking on the cluster for Chicago will display the login data of users logging in within Chicago).

User activity

Security Center provides insight into the status of inactive users (i.e., haven't logged in for 30+ days) and allows you to disable or delete them to ensure your data is secure. The timestamp displayed in Last Login is captured in UTC.

The User Activity section displays a list of your instance users along with their last login date and their activity status (i.e., active or inactive).

Disabling inactive users

To disable users who are inactive:

  1. In the User Activity section, select the checkbox to the left of the Artifact ID for inactive users you want to disable.
  2. Note: The checkbox will only display for users that are inactive (i.e., Inactive is set to Yes). You can filter this list either using the User Activity chart above, or through the standard Relativity column filters and sorting functionality.

  1. Select and click Disable from the pull-down menu below the table. A window will display asking you to confirm whether you want to disable the selected users.
  2. Click Disable again.
  3. A confirmation window displays and the selected users will be disabled. You will also receive a confirmation email at your listed Relativity user email address.

  4. Click Close to close the confirmation window.

Deleting inactive users

To permanently delete users who are inactive:

  1. In the User Activity section, select the checkbox to the left of the Artifact ID for inactive users you want to delete.
  2. Note: The checkbox will only display for users that are inactive (i.e., Inactive is set to Yes). You can filter this list either using the User Activity chart above, or through the standard Relativity column filters and sorting functionality.

  1. Select and click Delete from the pull-down menu below the table. A window will display asking you to confirm whether you want to permanently delete the selected users.
  2. Click Delete again.
  3. A confirmation window displays and the selected users will be deleted. You will also receive a confirmation email at your listed Relativity user email address.

  4. Click Close to close the confirmation window.

Lockbox access

Transparency and trust are two core tenants of the security program at Relativity. Relativity Lockbox ensures that Relativity support staff only have access to your workspaces when you provide it to them. In Security Center, you can do real-time access audits of Relativity support staff access and revoke access, if needed.

The Lockbox Access section displays a list of workspaces where Relativity staff currently have access along with information about the total Relativity staff granted access and the total groups granted access

Viewing Relativity staff access to a workspace

To view Relativity staff access in a selected workspace:

  1. In the Lockbox Access section, click the Expand button in the Relativity Employee List column for a workspace to view a list of the specific Relativity staff users that are granted access to the workspace.
  2. Note: Only workspaces accessible to Relativity staff users display in this list.

  1. Click Hide to collapse the expanded section.

Removing Relativity staff access to a workspace

To remove Relativity staff access to a workspace:

  1. In the Lockbox Access section, select the checkbox to the left of the workspace Artifact ID's you want to select.
  1. Click Remove Access below the table. A window will display asking you to confirm whether you want to permanently remove access for all Relativity staff to the selected workspaces.
  2. Click Remove Access again.
  3. A confirmation window displays and the selected workspaces will no longer be accessible to Relativity staff users. You will also receive a confirmation email at your listed Relativity user email address.

  4. Click Close to close the confirmation window.