General information and security preferences
General information
Add the name and email address to be used for identifying you in Intacct. Intacct automatically updates this name and email address to the user contact record.
Optionally, if you like, you can add your phone number and address.
Security preferences
Protect your company and your identity from unwanted or unlawful access.
| Option | Description |
|---|---|
|
Select a standard question, or create a custom question, and provide the Answer so that anytime you forget your password, Intacct can verify that you really are who you claim to be. Your administrator cannot view or change your security question and answer. If you forget your security question and cannot log in, your administrator will need to reset your password.
|
|
|
Timeout |
|
|
Desktop timeout notification |
Managing your desktop notifications The process of managing permissions can vary from browser to browser. This example is for managing notification permissions in Chrome. To manage notifications in a Chrome browser:
|
|
Change password |
Select Change password. Then, enter your current and new password, then confirm your new password. Intacct immediately enables the new password. If your company is configured for 2-step verification, you’ll be prompted to enter a verification code during the password reset process and the next time you log in. |
|
Select Change account email address to change the email address associated with your account. This email is only accessible to you and your company admins. This limited availability ensures greater privacy and protection from unauthorized access. This email address also helps Intacct more efficiently communicate with you when you have login-related issues. For example, if you get locked out of Intacct, you’ll receive password reset instructions at this email. The Primary email address on your Contact record and the Account email address can be different.
|
|
|
A layer of account security, requiring you to enter a verification code that you receive by authenticator app, text, or phone call when you log in. When setting up or making changes, you'll first need to enter your account password to verify your identity. Users will receive an email notification when any changes are made to their Primary, Backup, and Trusted Devices.
What's a trusted device?
Trusted devices are devices like a laptop or mobile phone where you can save your login information to log in automatically without needing to enter your username, password, or a verification code. |