Updated Articles

  1. Release 5.59

    Changes & Bugfixes Infrastructure and backend changes improving workflow prefill connectors ...
  2. Grant Access Feature

    Overview The Grant Access Feature in FormAssembly can be used to accomplish two functions. First, if your organization is in need of support from the FormAssembly team, you can grant access to your forms so that we can better troubleshoot any iss...
  3. IP Anonymization

    Overview IP Anonymization is an optional privacy setting that automatically anonymizes IP addresses collected with form submissions.  Requirements Enterprise Compliance Cloud For information on upgrading, please contact our Sales Departm...
  4. Multi-factor Authentication

    Overview Multi-factor authentication (MFA) is any additional method of authenticating yourself to an application other than your standard username and password combination. These can be tokens you hold, such as security keys, authenticator apps o...
  5. Secure File Scan

    Overview Improve your security by enabling Secure File Scan to check all incoming file upload field attachments on submitted forms and workflows. After a form is submitted, Secure File Scan checks all attachments for viruses and displays the resu...
  6. Security Logs

    Security Logs provide information about user activity on your instance. View the log Status, Date of the logged event, Username of the user that triggered the logged event, and Event Description.
  7. Inactive User Logout

    Inactive FormAssembly users are automatically logged out after a set amount of inactive minutes. Choose from a dropdown of 5, 10, or 15 minutes.
  8. Grant Access Feature for Enterprise Administrators

    Learn about FormAssembly's Grant Access feature
  9. IP Anonymization

    Learn about IP anonymization from the admin dashboard
  10. Multi-factor Authentication

    Overview Multi-factor authentication (MFA) is any additional method of authenticating yourself to an application other than your standard username and password combination. These can be tokens you hold, such as security keys, authenticator apps on ...
Terms of Service · Privacy Policy