On this page:
- Manage Users’ Access and Roles
- Offboarding Users
- Login: Two-Factor Authentication (2FA)
- Third Party Login
- Information Update/Downloads
- General Tips
SELMA employs a multi-layered approach to system security. Here is a breakdown of the steps you can take to ensuring the safety and integrity of your student data.
Manage Users’ Access and Roles
There are three roles and privileges available on SELMA –
- Teacher – Can mark components and attendance of the students enrolled in the intakes they are assigned to. A teacher can also create notes against an assigned student and communicate with them via text.
- Administrator – Has full access to the software except for curriculum setup, submission of compliance reports, management of users and creation of intakes.
- Registrar – Has full access to the software.
We recommend that you manage these roles and do not unnecessarily grant high-level access to all users. Roles can be allocated and adjusted here- Settings -> Users -> Select User
Offboarding Users
Always off-board users that are no longer part of your organisation – check last login timestamps to more effectively manage this process.
You can check user activity here – Settings -> Users
Login: Two-Factor Authentication (2FA)
2FA is a default feature on all SELMA instance and you will have to present two forms of evidence to gain access –
- Step 1 – Enter your username and password (we recommend that passwords consist of at least 8 characters with capitals, numbers and a special character)
- A one-off verification code is sent via email or generated by mobile apps such as Google Authenticator, Microsoft Authenticator or DUO.
Third Party Login
If you use this login type your identity is automatically verified via your Google or Microsoft 365 accounts. We also recommend that there are good password protocols in place for these programmes for example, the 2FA.
You can contact support@selma.co.nz to activate this login type.
Information Update/Downloads
Where possible, avoid downloading reports and SDR files and distributing them via email. This data is often sensitive and should only be viewed within a secure environment.
General Tips
- Lock your computer when you leave your desk – pretty self-explanatory but good to remember when you’re in a rush!
- Always use and update your antivirus software
- Use a password generator to create and remember complex passwords for all of your accounts
- Take care when sharing your screen – before heading into a virtual meeting make sure all tabs you won’t be needing are closed