Skip to main content

General Settings

Image_1988.png

The Display Name and Tenant ID are displayed at the top of the page.

  • Display name - A user-friendly tenant name that appears on the login screen.

  • Tenant ID - The unique identifier assigned to your tenant.

The page content is divided into the following three sections:

Basic information

  • Display name - Edit the tenant name that appears on the login screen.

  • Checkmarx service access - When enabled (default), service users can be created in the Checkmarx back office. This does not automatically generate service users; rather, they must be created by Checkmarx CloudOps.

    Service users give Checkmarx employees access to your tenant to demonstrate new features and provide support. These users are automatically assigned the roles of ast-admin and iam-admin.

    Access is automatically revoked after 15 days. If the feature is disabled before this period, any active service users will lose access immediately.

    Note

    Only users with the iam-admin role can enable or disable this feature.

  • Source code download requests - When enabled, users can download the source code directly from Checkmarx One for offline reviews, audits, or additional security testing.

Client Secrets & API Keys

  • Client Secrets

    • Secret expiration period in days - Set the default expiration period for Client Secrets, ranging from 30 to 365 days. The Client Secret will automatically expire after the set period.

    • Users can't change this - When selected, this setting enforces the default expiration period on all Client Secrets.

  • API Keys

    • Expiration period in days - Set the default expiration period for API Keys, ranging from 30 to 365 days. The API Key will automatically expire after the set period.

    • Users can't change this- When selected, this setting enforces the default expiration period on all API Keys, preventing custom expiration periods from being set.

Login & Session management

Enable MFA for IDP users - When enabled, administrators are able to configure Multi Factor Authentication (MFA) for Identity Providers (IDP) users during their initial login.

Note

This setting only applies to IDP users and does not affect users created within Checkmarx One. Toggling this option off will not disable MFA for Checkmarx One users.

Log-in

  • Login attempts - Specify the number of failed login attempts allowed before the user is locked out.

  • Lock-out duration - Specify how long the user will remain locked out after exceeding the allowed number of failed attempts (in minutes).

Session run out

  • User is idle - Specify the session expiration time when a user has been inactive (in minutes or hours).

  • User is Active - Specify the maximum session duration (in hours) for sessions with active users.

  • Limit concurrent user sessions - When enabled, a limit of 3 concurrent sessions is applied to each user in the system. Default: disabled (i.e., no limit is applied).

  • Enable SSO-Only Access Login: This setting makes sure users can log in only through Single Sign-On (SSO).

    Normally, users can still log in with a username and password even if they've been removed from your Identity Provider (like Okta). Enabling this option blocks that and forces SSO-only access.

    When you turn on Enable SSO-Only Access Login, you’ll see two exception options:

    • All users except the tenant owner

    • All users except the tenant owner + iam-admin: This option is helpful if you have several users with iam-admin permissions, since those users can change settings in the Login & Session Management section.

    The Enable SSO-Only Access Login setting is tied to the Enforce SSO-Only Access option for individual users:

    • If Enable SSO-Only Access Login is disabled, the Enforce SSO-Only Access setting won’t be available.

    • If Enable SSO-Only Access Login is enabled, the system automatically applies Enforce SSO-Only Access to all users except those covered by the selected exception.

    • Admins can manually disable Enforce SSO-Only Access for specific users if needed.