t('User Management');?>

t('Easy account management, from 5 to 50 million users');?>

t('Integrated account management');?>

t('Nextcloud features integration with external user directories like LDAP, Active Directory or others as well as built-in account management, two-factor authentication and Single-sign-on support.');?>

in action

t('Easy user management');?>

t('Admins can create, modify, search and view user accounts using Nextcloud built-in user management. Name, disk quota, mail addresses and group membership can be handled and users can be given administrator privileges if needed.');?>

t('If you need to integrate Nextcloud with an existing system, take advantage of support for one or more LDAP directories instead of or in addition to local users. Nextcloud can secure logins with two-factor authentication and supports single sign-on through SAML, OAuth2, Kerberos and others.');?>

t('For large-scale solutions, performance optimization, additional tools and advice, see the ');?>t('Nextcloud customer portal.');?>

in action

t('Group admins');?>

t('The administrator can delegate some work by elevating some accounts to group administrator over specified groups. This allows them to create new users as members of these groups as well as delete and modify them.');?>

t('When enabled, group admins can also create 2-factor one-time login codes and do other administrative tasks like manage ACLs on Groupfolders.');?>

creating a guest account

t('Guest accounts');?>

t('The guest accounts app enables users to create guest accounts for recipients. The administrator can determine what access rights these users need to have to external storage and apps.');?>

t('As guests have a special (hidden) group, administrators can use the Workflow and File Access Control capabilities to restrict, for example, users from downloading or sharing data. In Virtual Dataroom scenarios guest accounts can be given access to data read-only or with editing rights while blocking downloads and watermarking all files. Documents can shared with them through the Secure Mailbox feature from the Nextcloud Outlook Add-in which prevents the mail body and attachments from leaking.');?>

t('Workflow and File Access Control');?>
t('Virtual data room features');?>
password settings

t('Password security enforcement');?>

t('Password security is extremely important and Nextcloud follows the latest and most strict standards.');?>

t('We go beyond these standards, checking passwords against the database of compromised accounts and passwords from well known security researcher Troy Hunt. This optional but highly recommended feature ensures users can not reuse a password which has been compromised on another website already. Read our blog to learn how this feature protects your users.');?>

t('Blog on HaveIBeenPwned check');?>

t('Add accounts easily with a QR code');?>

t('See how easy it is for a Nextcloud user to add new accounts on their mobile devices.');?>

t('Our powerful clients are among the best rated file sync and share clients in the industry and easy to use!');?>

t('Learn about our clients');?>

t('Remote Wipe');?>

t('While Nextcloud supports Mobile Device Management solutions, thanks to built-in support, remote wipe will work on systems not under management of the company. This is useful for home users but also large universities and of course in a scenario where guest accounts were handed to a third party. If you permit downloading of documents by the third party, you can wipe the documents from their devices when the the collaboration has ended.');?>

t('Remote wipe can be used on a per-device basis by users and on a per-user base by the administrator.');?>

Remote wipe as a user, per device
t('Remote wipe as a user, per device');?>
Remote wipe as admin, per user
t('Remote wipe as admin, per user');?>

t('Demo of remote wipe in the desktop client');?>

t('Learn more about how Nextcloud helps you keep your data secure.');?>

t('LDAP/Active Directory user management');?>

t('Nextcloud features a high performance, full-featured LDAP application which lets users authenticate through their LDAP credentials. Group management, quotas and sharing permissions can be managed as usual. Nextcloud features LDAP group support, sharing, primary groups and easy configuration with auto-detection of LDAP attributes.');?>

t('For security reasons, the default LDAP configuration is fully read-only. Creating, updating and removing LDAP configurations can optionally be done through an external, REST-based API.');?>

t('Nextcloud also supports limited LDAP/AD account management, enabling admins to create, modify or delete users in the connected user directory. Through a plugin-infrastructure, more capabilities can be added.');?>

t('Find documentation here.');?>

t('Get our LDAP datasheet');?>

">

t('Automated or manual provisioning');?>

t('Nextcloud offers an easy-to-use, REST-based provisioning API to create and configure user accounts. It is possible to create, edit, delete and query user attributes, query, set and remove groups, set quota and query total storage used in Nextcloud.');?>

t('The API enables an admin to query for active Nextcloud applications, application info, and to enable or disable an app remotely. HTTP requests can be used via a Basic Auth header to easily integrate workflows with existing tools and infrastructure.');?>

t('Find documentation here.');?>

in action

t('Multi-factor authentication');?>

t('Nextcloud supports a wide variety of second factors and allows admins to enforce use of 2-factor authentication.');?>

t('Second factors:');?>

  • t('Time-based One-Time Password (TOTP, including Google Authenticator or similar apps');?>
  • t('Universal 2nd Factor hardware tokens (U2F, like Yubikeys or Nitrokeys, also supports NFC)');?>
  • t('Gateways: SMS, secure messaging apps Telegram, Signal and more');?>
  • t('Notification (just click to approve login on an existing device like phone)');?>
  • t('Code in an email');?>
  • t('User backup code (User has to generate these in advance and store them in a safe location)');?>
  • t('Administrator backup code (creating those can be delegated to group admins)');?>

t('Any number of these can be enabled by the admin.');?>

t('Active user sessions can be invalidated through a list, by removing the user in the admin settings or by changing passwords. Users can manage their own sessions and devices.');?>

t('Find documentation here.');?>

t('OTP Nitrokey hardware has been certified with Nextcloud.');?> t('U2F, FIDO2 and HSM functionality is being developed.');?>

t('Some examples');?>

2FA enforcement settings, enforcing for guest users
t('2FA enforcement settings, enforcing for guest users');?>
2FA setup on first login
t('2FA setup on first login');?>
One-time login token creation
t('one-time login token creation');?>

t('Single-sign-on');?>

t('Nextcloud features an SSO & SAML app for easy Single-sign-on integration. SAML 2.0 is supported against OneLogin, Shibboleth, and ADFS. The app also features authentication via environment variables, including support for Kerberos, OAuth2, OpenID and many other mechanisms provided by Apache modules.');?>

t('The native SAML integration negates the need for external software like Apache modules. Native SAML is compatible with all webservers and supports group memberships, flexible session management and app specific passwords. It can handle multiple Identity Providers and can authenticate to Samba servers with Kerberos.');?>

t('Find documentation on our customer portal.');?>

t('Other user backends');?>

t('Nextcloud can work with a number of other backends for authentication and user handling: IMAP, SMB and FTP. These can be used to integrate Nextcloud more easily in company infrastructure. On the app store, more authentication and user backends can be found, like integration with Gluu.');?>

t('Find documentation here');?> t('and');?> t('our app store here.');?>

t('Machine learning based suspicious login detection');?>

t('Nextcloud includes a machine learning technology which trains a neural network on successful logins on the instance and uses it to classify login attempts. Should it detect a login classified as suspicious by the trained model, it will notify the user and store an entry in the log for the system administrator.');?>

t('When the user is notified, they can terminate the suspicious session, and proceed to set a new password. The administrator can also take action, like disabling user accounts or forcing users to pick a new password.');?>

t('Of course, the solution is designed to protect privacy and all data remains on your server!');?>

t('Learn more in our');?> t('announcement blog');?>