General information and security preferences

General information

Add the name and email address to be used for identifying you in Intacct. Intacct automatically updates this name and email address to the user contact record.

Optionally, if you like, you can add your phone number and address.

Security preferences

Protect your company and your identity from unwanted or unlawful access.

Option Description

Password security question
and Answer

Select a standard question, or create a custom question, and provide the Answer so that anytime you forget your password, Intacct can verify that you really are who you claim to be.

Your administrator cannot view or change your security question and answer. If you forget your security question and cannot log in, your administrator will need to reset your password.

Timeout

  • Inactivity duration: Set the amount of time your company can remain inactive before it logs you out. There is a maximum amount of hours you can choose which has been set on the Company Information page.
  • Session duration: Set the total amount of time you can work in your company, regardless of whether it's active or not, before it logs you out. There is a maximum amount of hours you can choose which has been set on the Company Information page.

Desktop timeout notification

Managing your desktop notifications

The process of managing permissions can vary from browser to browser. This example is for managing notification permissions in Chrome.

To manage notifications in a Chrome browser:

  1. Go to Chrome Settings.
  2. In the Settings page, select Privacy and security.
  3. In the first set of options on the Privacy and security page, select Site Settings.
  4. In the Site Settings page, scroll down and select the dropdown beside Notifications.
  5. Scroll down to either the Block or Allow sections to set notification options.
  6. If it is not already there, in the Allow section, select Add to add permissions for Intacct notifications.
  7. Enter intacct.com in the Site field.

Change password

Select Change password. Then, enter your current and new password, then confirm your new password. Intacct immediately enables the new password.

If your company is configured for 2-step verification, you’ll be prompted to enter a verification code during the password reset process and the next time you log in.

Change account email address

Select Change account email address to change the email address associated with your account.

This email is only accessible to you and your company admins. This limited availability ensures greater privacy and protection from unauthorized access.

This email address also helps Intacct more efficiently communicate with you when you have login-related issues. For example, if you get locked out of Intacct, you’ll receive password reset instructions at this email.

The Primary email address on your Contact record and the Account email address can be different.

2-step verification

A layer of account security, requiring you to enter a verification code that you receive by authenticator app, text, or phone call when you log in. When setting up or making changes, you'll first need to enter your account password to verify your identity.

Users will receive an email notification when any changes are made to their Primary, Backup, and Trusted Devices.

  • Primary method: How you receive the verification code (by authenticator app, text, or phone call) and the phone number we send it to (if you receive the code by text or phone call). To edit, select Remove. In the Verify your identity window, enter your account Password, then select Set up now.
  • Backup: If your primary phone is not available when you log in, we list the backups you've entered, ask you to select one, and send a verification code there. Set up a different phone number as a backup, in case your primary is not available.
  • Trusted devices: If you log in from a computer that only you use, save time by identifying it as a trusted device. When you log in from a trusted device, we will not prompt you for a verification code.
  • To identify the computer you're currently using as a trusted device, set up a Primary or Backup for 2-step verification, and we'll ask you at the end of the setup process.
  • If you've previously identified any computers as trusted devices, but you've changed your mind, select Trust no devices. This will clear all listed trusted devices, and you’ll be prompted to enter a verification code for each subsequent login.