Security Center
The Security Center is a centralized hub for managing all security-related features in MeetLoyd. It provides a unified interface for security administrators to monitor, configure, and respond to security events.
Access Requirements
| Requirement | Details |
|---|---|
| Plan | Growth or Enterprise |
| Role | Admin or Owner |
Security Center Features
The Security Center consolidates all security management into one location, accessible from the top navigation bar (shield icon).
Approvals
Manage human-in-the-loop approval workflows for sensitive agent operations. Configure approval policies, review pending approvals, view approval history, and set up trusted patterns to auto-approve certain operations. Learn more
Delegations
Control which users can approve operations on behalf of others. Create delegation rules, set delegation expiry, and audit delegation usage.
Audit Logs
Complete visibility into all platform activity. Search and filter logs, export for compliance, configure retention policies, and set up alerts for specific events. Learn more
Incidents
Track and respond to security incidents. View active incidents, track incident timelines, assign responders, and document resolution steps. Learn more
SSO Configuration
Manage Single Sign-On settings for your organization. Configure SAML/OIDC providers, manage identity provider mappings, and enforce SSO for all users. Learn more
SCIM Provisioning
Automate user provisioning and deprovisioning. Configure SCIM endpoints, map user attributes, and sync groups from your identity provider. Learn more
SIEM Integration
Export security events to external security tools. Configure SIEM destinations, map event types, and set up real-time streaming. Learn more
Access Reviews
Periodic review of user permissions and access. Schedule access reviews, assign reviewers, track review completion, and generate compliance reports. Learn more
Session Management
Monitor and manage active user sessions. View active sessions, force session logout, configure session policies, and set idle timeout rules. Learn more
Quick Actions
From the Security Center dashboard, you can quickly:
- View recent security events: See a timeline of recent security-relevant actions
- Check compliance status: Overview of your security posture
- Review pending approvals: Quickly approve or deny pending requests
- Check for active incidents: See if there are any ongoing security incidents
Navigation
The Security Center uses sub-navigation tabs to organize features:
| Tab | Availability |
|---|---|
| Approvals | Growth+ |
| Delegations | Growth+ |
| Audit Logs | Growth+ |
| Incidents | Growth+ |
| Access Reviews | Enterprise |
| Sessions | Growth+ |
| SIEM | Enterprise |
| SSO | Enterprise |
| SCIM | Enterprise |
Feature Availability by Plan
| Feature | Growth | Enterprise |
|---|---|---|
| Approvals | Full | Full |
| Delegations | Full | Full |
| Audit Logs | 90 days | Custom retention |
| Incidents | Full | Full |
| SSO | -- | Full |
| SCIM | -- | Full |
| SIEM | -- | Full |
| Access Reviews | -- | Full |
| Sessions | Full | Full |
| Custom Policies | -- | Full |
- Daily: Check for pending approvals and active incidents
- Weekly: Review audit logs for unusual activity
- Monthly: Conduct access reviews
- Quarterly: Review and update security policies
Next: Learn about Authentication for user access control.