Version 6.5 of Smartabase contains exciting new functionality, which will be available to you shortly. The main themes for this update are security-related configuration options and user interface improvements. Here’s a short overview of what’s new:
- More configuration options for password criteria.
- Password policies that can be applied to specific types of people (using roles).
- Explicit control for how multi-factor authentication (MFA) codes are communicated (SMS, email and/or authenticator application).
- Collapsable sidebars across the Smartabase web application to provide more screen space.
- Improved user experience when accessing the data specification tool.
- A new tool for whitelisting IP addresses to reduce unnecessary multi-factor authentication (MFA).
- Expanded configuration options for connections between enterprise sites.
More configuration options for password criteria
In version 6.2 of Smartabase we added the ability for you to request changes to the site-wide password policy. Now, in version 6.5, we’ve added more options to help you increase the security of your organisation’s people and data. This means that, as a default for your Smartabase site, we can help you to specify:
- Maximum password change frequency – how often can someone’s password be changed?
- Enforced password changes after a set period – how long should a password be useable for?
- Prohibiting the use of previous passwords – should people be able to re-use old passwords?
- Prohibiting matches to common patterns – is it okay for passwords to include sequences like 1234 or qwerty?
- Maximum password length – can people make passwords longer than, for example, 24, 35 or 90 characters?
Please reach out to your service team contact if you want to make changes to your default password policy. Also note that these new criteria are also available for role-specific password policies (see below for more on this).
(!) Warning: to maintain our commitment to the security of your data, Fusion Sport is required to make certain changes to all current default password policies. These changes will come into effect on all sites as they are updated to version 6.5 of Smartabase:
- Maximum password change frequency will be set at two (2) per day by the user account owner and five (5) per day per user account when carried out by a site administrator.
- Preventing re-use of previous passwords: the eight (8) most recently used passwords will not be accepted for use as a new password.
Because this is a change to the default policy, all accounts are covered by these protections, including athletes, coaches, team administrators, site administrators, site builders and accounts used for integrated technologies, Fusion Sport support or internal testing within your organisation.
Create password policies for roles
You can now make use of a new password policy management tool for administrators to configure and apply password policies on a role-by-role basis. If someone has multiple password policies (for example, because they have two roles), the strictest criteria from each policy will be enforced. Note that this measure also takes into account the site-wide policy, so if a policy created by an administrator is less strict than the site policy, the site policy will override the administrator’s policy.
Because password policies have an immediate and significant effect on the login experience for people accessing Smartabase, we’ve added a special system permission for using this tool. Please contact our customer service team if you would like to use the password policies tool within your organisation, and we’ll make sure you’ve got everything you need to know to use it effectively.
Choose how multi-factor authentication codes are communicated
Many of you are using multi-factor authentication (MFA) to help the members of your organisation keep their account secure. In previous versions of Smartabase, when someone went through the process of multi-factor authentication, Smartabase would generate and send a time-based-one-time-password (MFA code) via email and SMS (text message). People could also generate the MFA code using an authenticator app, but they’d always receive the MFA code as a communication from Smartabase as well.
In Smartabase version 6.5, there are three specific preferences for the method of getting an MFA code:
- Authentication app only (most secure).
- SMS or authentication app.
- Email, SMS or authentication app (least secure).
Like password policies, there is more than one level at which MFA communication preferences can be set:
- As site-wide default setting – your Fusion Sport consultant can put this in place for you.
- On a role-by-role basis, set by a Smartabase administrator.
- At the individual user account level, chosen by the user account owner.
Note that, as with password policies, a strict setting at the site or role level will reduce the choices at the role or user account level respectively. So if you update someone’s role to only communicate MFA codes via authentication app or SMS, they won’t see the option in their user account to receive MFA codes via email.
Collapse sidebars across the Smartabase web application
Every time you see a sidebar in the Smartabase web application, you can now collapse it! This gives everyone more space to view and interact with their data.
This applies to all areas of the user interface, including within the administration and building interfaces. For example, you can collapse the sidebar menu that houses controls for the resources tool to have more screen space to review your search results. Then, hover your mouse over the collapsed sidebar border to bring back the resource search menu and interact with the controls in it.
Explore the structure of your Smartabase site with improvements to the data specification tool
The data specification tool for Smartabase builders provides you with a birds-eye view of all forms that exist on your site, along with important settings within forms that affect your whole site (whether a form uses the Smartabase analytics connector or if a field is set as a status indicator or critical information).
The new navigation options on the side allow you to quickly reduce the amount of information you are looking at. Then, you can use the dropdown in each section to review the outline for a specific form. We’ve improved the styling as well to make the information easier for you to interact with and interpret.
Whitelist trusted IP addresses to avoid unneeded multi-factor authentication
If you’re a Smartabase administrator, you may be able to make use of the new security whitelisting tool (talk to your Fusion Sport consultant for training and access first). We built the whitelisting tool for organisations with multi-factor authentication set up for people using trusted and known IP addresses. With the whitelisting tool, you can specify a list of IP addresses that are trusted.
Anyone logging into Smartabase from a whitelisted IP address won’t be required to re-authenticate whenever a network change is detected.
Expanded configuration options for connections between enterprise sites
We are continually working on improving support for our enterprise customers, and as a result we’ve significantly expanded the flexibility of how the information can be linked between sites in hierarchical and peer-to-peer server configurations. Moreover, these linking options are now quicker and easier to use so that we can support our customers more efficiently. Please reach out to our service team if you are considering using an enterprise server configuration in your organisation or would like to know more.
General improvements and bug fixes
- We’ve improved searching behaviour in the reports tool for situations when you’re looking for all instances of a value being blank.
- When you make and save a change to how an event form is built, the warning message includes the number of future records that would be affected by your change.
- We’ve removed the ability to download profile data directly from the profile form tool in the builder interface. This was a legacy feature that has now been deprecated. Profile form data will continue to be available from the reports tool, according to normal data permission rules set within your role.
- The tooltip for performance standards wasn’t appearing for the first row in a report but appeared on remaining rows. We’ve fixed that and it will appear for all rows when they’re hovered over.
- We fixed a typo in one of the OSICS body diagram options: AZXX Ankle Pain/Injury not otherwsie specified has been updated to AZXX Ankle Pain/Injury not otherwise specified.
- It’s no longer possible to include commas in the email address field for a user account.
- New Zealand daylight savings rules were being applied to the date of birth field in user accounts, which caused the date to be wrong in rare cases. This is now fixed.
- We’ve resolved a problem that meant some attachments and resources could not be accessed as expected, which caused an error message to appear.
- We fixed an issue that prevented you from seeing critical information in the right-hand sidebar if you didn’t also have permission to view the left-hand sidebar in your role.
- We’ve addressed multiple issues with the process of managing performance alerts.
- When writing calculations, you may have noticed that the weekstart function could not accommodate leap years and returned erroneous results. We’ve fixed that.
- We’ve resolved an issue that meant it wasn’t possible to make rating fields (a type of option field) required.
- In some cases, personal groups were being unexpectedly duplicated, which has now been fixed.
- Some enterprise customers experienced issues with unlinked or deleted user accounts not being removed from child sites – this has now been fixed.
Highlights from your last Smartabase release notes
In the last release notes, for Smartabase 6.4, we announced:
- The ability to resave event form data for selected periods.
- A new advanced form property to disable event conflict notifications for specific event forms.
- Improvements to how Smartabase handles signatures and calculations for recording the date of entry when these are part of a table in an event form.
If you missed them, you can read the last Smartabase release notes here.