Security and Membership

Every new version of Kentico goes through detailed security testing and our developers are trained to write secure code and use internal automated tools for identifying possible security threats in our code.

 Permission matrix

Authentication

Kentico supports several authentication methods, including:

  • Forms authentication based on standard ASP.NET authentication
  • Windows authentication and integration with Active Directory
  • Social Network authentication
  • Claim Based authentication
  • Multi-factor authentication
  • Custom authentication mechanisms for your existing user databases or legacy systems

Learn more about authentication options in Kentico

User Management

Kentico can store millions of user accounts in its database and they can be easily managed through the administration interface. User profiles can contain custom fields defined by administrators.

New user accounts can be created by administrators, imported from external systems, or visitors can register on the website and create an account. Kentico comes with customizable web parts for registration and account management by users (change password, edit user details, etc.).

Customizable User Roles

Every user can be assigned to any number of roles. While there are a few pre-defined roles in Kentico, administrators can easily define their own roles and grant them permissions.

Module Permissions

Every module has a predefined set of permissions (such as read, modify, delete, approve, etc.) and administrators can grant users these permissions. If you develop a custom module in Kentico, you can even utilize the built-in permission system for managing access to certain features.

Content Permissions

Kentico provides highly granular permissions for managing content. Since the content is organized in a content tree, you can set permissions for the whole site, for a chosen section, or for a single document. The permissions can be inherited from underlying content nodes and you can even break the inheritance and set specific permissions for a chosen section. Permissions can also be denied on underlying pages which override the permissions granted to the parent content.

Personalization Based on Permissions

Content and navigation displayed on the live site can be personalized based on the user read permissions for the given document. If the user cannot read the page, they won't find it in the navigation.

Double Opt-in Registration

When users register on the website, you may require them to confirm the registration by clicking a link in a confirmation e-mail, so that you can verify that their e-mail address is valid. You can also choose to approve all newly registered users before they can sign in.

Integration with reCaptcha

Kentico offers integration with Google reCaptcha, which protects your website from spam and abuse. ReCaptcha provides users with a great user experience and enables the detection of bots in just one click.  It uses an advanced risk analysis engine to tell humans and bots apart. With the new API, a significant number of your valid human users will pass the reCAPTCHA challenge without having to solve a CAPTCHA.

Anti Cross-Site Request Forgery (CSRF) Tokens

Kentico helps you increase the security of your website by providing the Anti Cross-Site Request Forgery Tokens. This system protects Kentico websites against CSRF vulnerabilities with no reduction in website performance. An alternative to traditional protection based on ViewState, the solution is based on tokens for the validation of a request.

Security Best Practices

Every new version of Kentico goes through detailed security testing and our developers are trained to write secure code and use internal automated tools for identifying possible security threats in our code.

Related Features

  • Authentication
  • search
    Menu
    Gartner report
    Kentico is in the
    Gartner Magic Quadrant for WCM!
    ×