iBase Features

Security

With iBase your assets and data are secure at all times. A sophisticated security model lets you control exactly who has what kind of access to your content, while a comprehensive audit log shows what has been happening.

Security illustration
Secure environment icon

Secure Environment

iBase is hosted within Amazon's AWS cloud environment and is regularly tested to help prevent unauthorised access to files or data. Penetration checks are carried out against current standards, and access can also be restricted to approved IP ranges or domains if required.

Secure folder hierarchies icon

Secure Folder Hierarchies and Roles

The iBase security model lets you define secure folder hierarchies and control who can upload, view, edit, download or share assets, who can see or edit individual metadata fields, and who can access workflow or administration functions.

AAD SSO integration icon

AAD and SSO Integration

iBase can integrate with Microsoft Entra ID/Azure AD and other single sign-on approaches so user authentication is aligned with your organisation's identity controls and access policies.

Secure read write API icon

Secure Read and Write API Access

Authorised external applications such as websites or CMS platforms can be granted tightly controlled API access rights. Combined with folder-level permissions, this allows precise management of which systems can see, retrieve or submit files and metadata.

Audit log icon

Audit Log and Reporting

iBase includes auditing of every action carried out, including the user, date and time, IP address, asset and whether the action succeeded. That applies to uploading, downloading, searching and editing, and can be reviewed in reports or external tools.