Does Payspace utilise network segmentation to limit access to sensitive data to specific network zones, thereby reducing the risk of a widespread network compromise?
This applies to all PaySpace editions.
Payspace utilises network segmentation to limit access to sensitive data to specific network zones, thereby reducing the risk of a widespread network compromise (i.e. users do not have access to the backend). Only a select few users will be able to access the back end via VPN and RBAC along with MFA.
Related Articles
The API Credential has full access. Why is the API User unable to access data from all PaySpace screens?
This feature is available on all PaySpace editions If the Security Role associated with the API User denies access to certain screens, the permissions of the security role will override the API Credential's "Full Access" configuration.
Is data encrypted at rest and during transport?
This applies to all PaySpace editions. All customer data is stored in South Africa and Europe (DR) and is encrypted at rest. PaySpace is powered by a single instance, multi-tenant architecture, in which all users and applications share a single, ...
Why does a Company or Business Partner level user not have access to a specific frequency?
This feature is available on all PaySpace editions If a Company or Business Partner level user cannot access a specific frequency in a company, verify whether they were granted permission to access it on their security user profile. Navigate > ...
Security | Maintaining Security Roles
Overview Once a Security Role has been added, you will need to specify the access required on screens and/or fields within the system. Edition This feature is available on all PaySpace editions. Navigation Navigate > Config > Security > Security ...
Can a customer's database be accessed by another customer?
This applies to all PaySpace editions. No. PaySpace is powered by a single instance, multi-tenant architecture, in which all users and applications share a single, common infrastructure i.e. database and code base, but is logically and uniquely ...