Use the navigation links below to browse.

Two-factor authentication

Impero two-factor authentication (2fa) is an optional choice and an easy way to strengthen security when using Impero. Especially when using Impero from outside the company domain, Impero two-factor authentication may be worth considering.

Impero is offering two-factor authentication as an additional security measure. When enabled, login requires password in combination with a PIN-code sent to your mobile phone. Impero two-factor authentication is easily administered by the users, and does as such not involve any implementation or need for central IT support.

Impero two-factor authentication is available worldwide.

Set up two-factor authentication

When two-factor authentication is enabled, new users must enter a valid phone number when granted access to Impero. When the number has been entered, click on “Use this number”, enter the authentication code, and two-factor authentication is activated.

A new authentication code must be entered each time a user login.

User access to a program

Access is granted from program level. You can grant access individually on all programs, thereby securing that only relevant users are granted access to view completed controls within the program.

There are three types of access rights, “Sender”, “Edit/Read” and “View”.

All controls sent from Impero will be provided with the name of the sender responsible for the program. This can be an individual user like the Head of Finance. You may also choose to create a user representing a department, for instance “Group Finance “. The sender will not gain any access to the program.

All users assigned with “Edit/Read” access will be able to manage the program. This means creating, editing, or deleting controls within the program, managing the program access rights, and viewing history of controls completed within the program.

Users with “View” access will be able to monitor the program in their Dashboard. A “View” access also grants the user access to review all history of the controls completed within the program. Furthermore, “View” access is needed when using data from the program within a report