On this page:
- Security Settings
- Managing User Access and Roles
- Login: Two-Factor Authentication (2FA)
- Third Party Login
- Sensitive Information & Downloads
- General Tips
Security Settings
Navigate to Settings -> Security
The security menu is used to set how users will log in to SELMA. A consultant would have set this up for you in the beginning, however, you can make changes to this if you e.g. prefer that all users have to login via 2FA app.
Please contact support if you need help with setting up your security logins, as successful and secure logins will rely on many integrated systems.

SELMA employs a multi-layered approach to system security. Here is a breakdown of the steps you can take to ensuring the safety and integrity of your student data.
Managing User Access and Roles
There are three roles and privileges available on SELMA:
User Type | Privilege |
---|---|
TEACHER (Tutor) | A teacher can mark components and attendance for students who are enrolled in an intake assigned to them. A teacher can also create notes against a student assigned to them and depending on the system configuration, send text messages to students. |
ADMINISTRATOR | An administrator has full access to the software except for curriculum setup, submission of compliance reports, management of users and creation of intakes. |
REGISTRAR | The registrar has full access to the software. Only registrars can access and maintain SELMA user records. |
We recommend that you manage these roles and do not grant high-level access to all users if not necessary. Roles can be allocated and adjusted here: Settings -> Users -> Select User
Please refer to User Setup and Privileges – Manage User:
Login: Two-Factor Authentication (2FA)
2FA is a default feature on all SELMA instance and you will have to present two forms of evidence to gain access –
- Step 1 – Enter your username and password (we recommend that passwords consist of at least 8 characters with capitals, numbers and a special character)
- A one-off verification code is sent via email or generated by mobile apps such as Google Authenticator, Microsoft Authenticator or DUO.
Third Party Login
If you use this login type your identity is automatically verified via your Google or Microsoft 365 accounts. We also recommend that there are good password protocols in place for these programmes for example, the 2FA.
You can contact support@selma.co.nz to activate this login type.
Sensitive Information & Downloads
Where possible, avoid downloading reports and SDR files and distributing them via email. This data is often sensitive and should only be viewed within a secure environment.
General Tips
- Lock your computer when you leave your desk – pretty self-explanatory but good to remember when you’re in a rush!
- Always use and update your antivirus software.
- Use a password generator to create and remember complex passwords for all of your accounts.
- Be careful when sharing your screen – before heading into a virtual meeting make sure all tabs you won’t be needing are closed.