Skip to main content

Security Center

The Security Center is a centralized hub for managing all security-related features in MeetLoyd. It provides a unified interface for security administrators to monitor, configure, and respond to security events.

Access Requirements

RequirementDetails
PlanGrowth or Enterprise
RoleAdmin or Owner

Security Center Features

The Security Center consolidates all security management into one location, accessible from the top navigation bar (shield icon).

Approvals

Manage human-in-the-loop approval workflows for sensitive agent operations. Configure approval policies, review pending approvals, view approval history, and set up trusted patterns to auto-approve certain operations. Learn more

Delegations

Control which users can approve operations on behalf of others. Create delegation rules, set delegation expiry, and audit delegation usage.

Audit Logs

Complete visibility into all platform activity. Search and filter logs, export for compliance, configure retention policies, and set up alerts for specific events. Learn more

Incidents

Track and respond to security incidents. View active incidents, track incident timelines, assign responders, and document resolution steps. Learn more

SSO Configuration

Manage Single Sign-On settings for your organization. Configure SAML/OIDC providers, manage identity provider mappings, and enforce SSO for all users. Learn more

SCIM Provisioning

Automate user provisioning and deprovisioning. Configure SCIM endpoints, map user attributes, and sync groups from your identity provider. Learn more

SIEM Integration

Export security events to external security tools. Configure SIEM destinations, map event types, and set up real-time streaming. Learn more

Access Reviews

Periodic review of user permissions and access. Schedule access reviews, assign reviewers, track review completion, and generate compliance reports. Learn more

Session Management

Monitor and manage active user sessions. View active sessions, force session logout, configure session policies, and set idle timeout rules. Learn more

Quick Actions

From the Security Center dashboard, you can quickly:

  • View recent security events: See a timeline of recent security-relevant actions
  • Check compliance status: Overview of your security posture
  • Review pending approvals: Quickly approve or deny pending requests
  • Check for active incidents: See if there are any ongoing security incidents

The Security Center uses sub-navigation tabs to organize features:

TabAvailability
ApprovalsGrowth+
DelegationsGrowth+
Audit LogsGrowth+
IncidentsGrowth+
Access ReviewsEnterprise
SessionsGrowth+
SIEMEnterprise
SSOEnterprise
SCIMEnterprise

Feature Availability by Plan

FeatureGrowthEnterprise
ApprovalsFullFull
DelegationsFullFull
Audit Logs90 daysCustom retention
IncidentsFullFull
SSO--Full
SCIM--Full
SIEM--Full
Access Reviews--Full
SessionsFullFull
Custom Policies--Full
Regular Reviews
  1. Daily: Check for pending approvals and active incidents
  2. Weekly: Review audit logs for unusual activity
  3. Monthly: Conduct access reviews
  4. Quarterly: Review and update security policies

Next: Learn about Authentication for user access control.