The administration interface provides comprehensive tools for managing user accounts, system settings, and organizational configurations. This centralized control panel enables effective governance of your phishing simulation platform while maintaining security and compliance standards across your organization.
Section | Description |
---|---|
Account Details | Modify username, display name, and other personal account information for user identification |
Password Security | Update account password with automatic session invalidation for enhanced security |
Multi-Factor Authentication | Enable additional security layers using TOTP authenticators. Strongly recommended for all accounts |
API Access Management | Configure API tokens for programmatic access and automation integration with external systems |
Multi-factor authentication (MFA) provides an essential security layer by requiring additional verification beyond your password. This significantly reduces the risk of unauthorized access and helps protect sensitive phishing simulation data and administrative functions.
Complete MFA setup by scanning the QR code with your authenticator app (such as Google Authenticator, Authy, or Microsoft Authenticator) and entering the generated verification code to confirm proper configuration.
Important: After successful setup, you will receive backup recovery codes. Store these codes securely as they provide account access if your primary authenticator device becomes unavailable.
Generate and manage API keys for programmatic access to Phishing Club functionality. These keys enable automation, integration with external systems, and custom application development while maintaining secure authentication protocols.
Note: Comprehensive API documentation will be available with the general availability release. Current early access provides basic API functionality for testing and development purposes.
Session management provides comprehensive oversight of all active login sessions for your account. Each successful login creates a unique session that maintains your authentication state. This interface enables monitoring of concurrent access, identification of unauthorized sessions, and selective or bulk session termination for enhanced security control.
Field | Description |
---|---|
IP Address | Source IP address associated with the session, enabling identification of connection location and potential security concerns |
Current Session Indicator | Visual indicator showing which session corresponds to your current browser connection, preventing accidental self-logout |
Administrative user management enables creation, modification, and oversight of individual user accounts within your Phishing Club instance. This centralized approach ensures proper access control, maintains accountability, and provides comprehensive audit trails for all user activities and system interactions.
Best Practice: Maintain individual accounts for each administrator to preserve detailed audit trails, enable granular access control, and support compliance requirements for security operations.
Force immediate logout for specific users by utilizing the Delete all sessions
function,
which invalidates all active sessions for enhanced security enforcement and access control.
Field | Description and Requirements |
---|---|
Display Name | Human-readable name for user identification in interfaces, reports, and audit logs |
Email Address | Unique email address for user identification, notifications, and password recovery functions |
Username | Unique login identifier for authentication. Should follow organizational naming conventions for consistency |
Initial Password | Secure randomly generated password for initial account access. Users should change this upon first login for security |
Available in Security Provider and Enterprise editions
Organization management enables creation and administration of separate company entities within your Phishing Club instance. This multi-tenant architecture ensures complete data isolation, independent statistics tracking, and customized security awareness programs tailored to each client organization's specific requirements and compliance needs.
Export comprehensive organizational data for backup, compliance, or migration purposes. Use
Export Shared
to download all global and shared resources that are available across
multiple organizations within your instance.
Access organization-specific data exports through the Actions
menu for individual
companies, enabling targeted data extraction while maintaining proper data isolation and privacy
controls.
Field | Description and Usage |
---|---|
Organization Name | Unique identifier for the client organization, used for data isolation, reporting, and administrative organization within the multi-tenant environment |
Navigate between different client organizations using the Change Company
function
to switch your working context. This enables administrators to manage multiple organizations while
maintaining proper data isolation and access controls.
The currently active organization context is prominently displayed in the top navigation menu, ensuring clear awareness of which organization's data and campaigns you are currently managing:
Global system settings provide centralized control over platform-wide configurations, security policies, and operational parameters. These settings affect all users and organizations within your Phishing Club instance and require careful consideration to maintain optimal system performance and security standards.
Category | Configuration Options and Impact |
---|---|
License Management | Update license keys, modify edition features, and manage subscription settings for platform functionality |
General System Settings | Configure upload limits, define repeat offender thresholds, and set operational parameters for optimal system performance |
Single Sign-On Integration | Configure SSO authentication with Microsoft 365 and other enterprise identity providers for streamlined access management |
Data Import/Export | Manage bulk data operations including imports from other Phishing Club instances and migration utilities |
System Logging | Adjust logging verbosity levels for troubleshooting, performance monitoring, and technical support requirements |
The bulk import system enables efficient migration of assets, landing pages, email templates, and other resources from external sources or other Phishing Club instances. This powerful feature streamlines content deployment and facilitates rapid platform setup with pre-built simulation components.
Download a comprehensive example import file to understand the required structure: Phishing Club Import Example.zip
Follow these steps for successful data import:
Import files must follow a specific directory structure for successful processing and proper resource organization:
assets/
- Global assets directory containing shared resources available
across all templates and campaignsdata.yaml
configuration files with the following subdirectories:
assets/
- Template-specific multimedia resourcespages/
- HTML landing page files for user interactionemails/
- Email template content and designsEach template directory requires a data.yaml
configuration file that defines the template
structure, content relationships, and metadata for proper import processing:
name: "Professional Template Name" pages: - name: "Landing Page Name" file: "pages/landing.html" emails: - name: "Email Template Name" file: "emails/template.html" envelope from: "[email protected]" from: "Display Name <[email protected]>" subject: "Compelling Email Subject Line"
The import system comprehensively validates and processes the following components:
Upon completion, the system provides a comprehensive import summary detailing:
Configure enterprise Single Sign-On integration with Microsoft Azure Active Directory to streamline user authentication and leverage existing organizational identity management infrastructure for enhanced security and user experience.
Begin the SSO configuration process by registering a new application in your Microsoft Azure portal to establish the authentication relationship between Phishing Club and your organization's identity provider.
Configure the Redirect URI field with your Phishing Club instance URL:
your-domain.tld/api/v1/sso/entra-id/auth
. This exact URL can be copied from the
SSO setup modal for accuracy and consistency.
Extract the required authentication identifiers from Azure and input them into Phishing Club:
Client ID
fieldTenant ID
fieldProceed to create authentication credentials by clicking Add a certificate or secret
to generate the secure authentication token required for API communication between systems.
Generate a new client secret and immediately copy the displayed Value
into the
Secret
field in Phishing Club. Important: This value is only displayed
once and cannot be retrieved later.
Complete the SSO configuration by clicking Enable SSO
to activate enterprise authentication
integration. Users will now be able to authenticate using their organizational Microsoft 365 credentials
for seamless access to Phishing Club.