Skip to main content
Category: Technical Guide

How to secure and protect your IT documentation

Learn how to secure your IT documentation with Hudu’s features, including MFA, password management, and safeguarding sensitive company knowledge from internal and external threats.

Jacob Hart's profile photo
Jacob Hart
Co-Founder & CEO
Estimated reading time: 2 min read
Beyond the BasicsDocumentation Tips
Secure IT documentation with MFA

Passwords, company knowledge, and unique business processes are a critical piece of infrastructure. How do you make sure you protect all of them?

At Hudu, we have created features to protect your IT documentation, from both external and internal threats.

  1. Require all users to have MFA. As an Admin or above, you can force multi-factor authentication mandatory for all users.
  2. Access restrictions. Allow technicians to only access content they currently need. Hudu group access restrictions allow you to add technicians to a group, and restrict the companies, articles, processes, websites and assets they can see. Inherited restrictions cascade down so, if you restrict a technician from being able to access a company, all assets within that company are also restricted.
  3. Choose the appropriate role for each technician. Hudu allows 5 different user roles (Super Admin, Admin, Editor, Author, Spectator). Choose a role for each technician. If an employee should not be able to perform an action, then create the restriction. The user roles are as follows:
    1. Super Admin: Can perform all available actions.
    2. Admin: Can perform all administrative actions, except for setting billing and CSV exports of data.
    3. Editor: Can perform archiving, adding, editing, sharing, and flagging. Cannot permanently delete items. No administrative rights.
    4. Author: Most Hudu customers have the majority of their technicians set to the Author role. Authors can add and edit, but cannot flag, share passwords, or flag entities.
    5. Spectator: For users that only require basic viewing rights, the Spectator role is perfect. Spectators can only view documentation and have no ability to add or edit.
  4. Create access schedules. Hudu allows you to set the hours that a technician can log in. Attempts outside of schedules are denied and are logged for viewing by a Super Admin or Admin.
  5. Choose self-hosting. For those that want complete lockdown of their data, choose self-hosted Hudu. Your keys and data are all hosted on the infrastructure you choose.
  6. Check access logs often. Hudu provides comprehensive access logs of all users, and what activities they are performing at which times and from which locations.

Share this article

Jacob Hart's profile photo

Jacob Hart

Co-Founder & CEO

Jacob launched Hudu in 2018 to simplify documentation and operations, growing it into a Y Combinator-backed company trusted by customers from startups to Fortune 50 enterprises. A Colorado State University graduate, Jacob is known for his witty, no-nonsense approach to leadership and product development.

Related Posts

Continue exploring our latest insights and technical guides

Advanced IT documentation strategies
Category: Technical Guide

Take your Documentation to the Next Level!

Streamline client communication and boost operational efficiency with Magic Dash widgets, custom CSS, anchor tags, and embedded content for your MSP software stack.

Jordan Hart's profile photo
Jordan Hart
Product Manager
Structured asset layout tips for scalable IT documentation
Category: Technical Guide

Optimizing Asset Layouts

Create organized IT documentation with Hudu’s structured framework, improving IT management, knowledge bases, MSP tools, and IT service management workflows.

Jordan Hart's profile photo
Jordan Hart
Product Manager

Ready to Transform Your IT Documentation?

Join thousands of IT teams who trust Hudu to organize their infrastructure, passwords, and knowledge. Start your free trial today.