Recommended Security Configuration
To help you get the most out of ProGlove INSIGHT while keeping your account and devices secure, we recommend reviewing your configuration against the practices below. These settings and actions are designed to protect your data, control access, and reduce the risk of unauthorized use. Administrators can use this checklist when setting up a new account or as part of regular security reviews.
Restrict User Permissions
Keep user access as limited as possible. Assign the Admin role only to system owners who truly need full management rights, and use the User role for those who just need analytics or operational views. Review accounts regularly and remove any that are no longer needed. Where available, SSO can make this process easier by ensuring user access is tied to your organization’s central account management.
Extended User Roles and Permissions
If your organization operates across multiple sites or business units, take advantage of Extended User Roles to limit access to specific locations or functions. Roles can be combined with level-based restrictions to ensure users only see and manage the parts of the system that are relevant to their work. Regularly review these permissions to confirm they still match your organizational needs. Access to Extended User Roles and Permissions can be requested for your account — contact ProGlove to enable this feature.
Control Access to Provisioning Certificates
Provisioning Certificates are the keys that allow devices to connect to your INSIGHT account, so treat them with the same care as sensitive credentials. Whether you are provisioning devices individually or using fleet provisioning through an MDM system, store certificates securely and delete them as soon as they have been used. This helps prevent unauthorized devices from joining your network.
Review and Manage Stored Network Credentials
While it is possible to store Wi-Fi or other network credentials in the INSIGHT platform for device connectivity, it is generally recommended not to store them unless absolutely necessary. If credentials are stored, review them regularly to confirm they are still required, and remove any that are no longer in active use to reduce the risk of unauthorized access to your network.
Review Device Access Regularly
Periodically review the list of devices connected to your INSIGHT account. Remove any devices that are lost, decommissioned, or no longer in use to reduce potential security risks.
Keep Devices Updated
Ensure that all scanners and connectivity devices are running the latest firmware available through INSIGHT. Firmware updates often include important security and stability improvements.
Plan for Incident Response
Have a clear plan for how your team will respond if something goes wrong. Keep ProGlove’s security contact (security@proglove.com) handy, and set up an internal process for escalating and investigating suspicious activity. Subscribe to the ProGlove Status Page at Proglove Insight Status to receive real-time updates on service health and incidents. Acting quickly can limit the impact of a security incident.
Enable Single Sign-On (SSO) with Multi-Factor Authentication
Connecting INSIGHT to your enterprise Identity Provider (IdP) using OpenID Connect or SAML v2.0 centralizes authentication, reduces password fatigue, and ensures your organization’s login policies such as Multi-Factor Authentication are applied. Whenever possible, disable local account logins so that all users sign in through SSO. To enable SSO for your INSIGHT account, please contact ProGlove Support at support@proglove.de.