Table of Contents:
Account Overview
Once your account has been approved, you can access the full features of the platform.
Before exploring all sections, ensure your onboarding is complete so your account is properly configured.
Complete Your Account Onboarding
At the top of your dashboard, you may see a Complete your account onboarding banner.
This banner indicates that required onboarding steps are still incomplete.
What Happens When You Click “What is missing”
Clicking What is missing will open a side panel displaying a checklist of onboarding requirements.
Table Reference – Onboarding Checklist Panel
| Item | Description |
| Checklist View | Displays all required onboarding steps. |
| Highlighted Items | Clearly marks incomplete steps. |
| Direct Navigation | Allows you to click and go directly to the section that requires action. |
✨ Tip: Complete all onboarding steps before enabling distribution to avoid configuration delays.
Security Settings
The Security Settings section protects your account through authentication controls and session monitoring.
This section includes:
- Two Step Authentication
- Login Session Monitoring
- Language Preferences
We strongly recommend enabling Two Step Authentication.
Two Step Authentication
Two Step Authentication adds an extra layer of login verification to prevent unauthorized access.
How to Enable
- Click Add authentication step.
- Select your preferred method.
- Complete the verification process.
- Save the configuration.
⚠ Once enabled, verification will be required at every login.
Table Reference – Authentication Methods
| Method | Description | Recommended For |
| Authenticator App |
Scan the QR code or manually enter the secret key into an authenticator app such as Google Authenticator. |
Users requiring higher security or shared accounts. |
| Email Token | Receive a one-time verification code via email during login. | Users who prefer not to use an authenticator app. |
Login Sessions
The Login Sessions section allows you to monitor where your account is currently logged in.
This helps detect unfamiliar or unauthorized access.
Table Reference – Login Sessions
| Field | Description |
| Location | Shows the geographical location of the login. |
| IP Address | Displays the IP used during login. |
| Last Active | Indicates the most recent activity timestamp. |
| Current Session | Identifies the session you are currently using. |
Managing Active Sessions
| Action | Description |
| Select Session | Tick the checkbox to select a session. |
| Sign Out Selected Sessions | Logs out the selected session(s) remotely. |
✨ Tip: Regularly review active sessions if multiple users access the same account.