What is External Access?
External access enables:- Limited access without full accounts
- PIN-based authentication
- Controlled information sharing
- Time-limited access
Use Cases
| Scenario | Example |
|---|---|
| Site Registration | Sites registering for a study |
| Document Review | External reviewers accessing documents |
| Regulatory Access | Auditors or inspectors |
| Partner Access | Collaborators needing limited view |
Site Self-Registration PIN
The most common external access use case:How It Works
Managing the PIN
| Action | How |
|---|---|
| View PIN | Study Settings > Sites > Self-Registration |
| Change PIN | Generate new PIN in settings |
| Disable | Turn off self-registration |
Access Controls
What External Users Can Access
| Access Level | What’s Available |
|---|---|
| Registration | Registration forms, surveys |
| Public Info | Public hub content |
| Limited View | Specifically shared content |
What External Users Cannot Access
- Study data
- Participant information
- Internal configurations
- Full application features
PIN Security
Best Practices
Limit Distribution
Limit Distribution
Share PINs only with intended recipients.
Change Regularly
Change Regularly
Update PINs periodically or when needed.
Track Usage
Track Usage
Monitor who is using the PIN.
Disable When Done
Disable When Done
Turn off PIN access when no longer needed.
When to Change PIN
Change the PIN when:- PIN may have been shared too widely
- Recruitment wave is complete
- Security concern arises
Audit Trail
External access is logged:| Event | Recorded |
|---|---|
| PIN Use | When, what IP |
| Registration | Who registered |
| Access | What was accessed |
Configuring External Access
Monitoring External Access
Track external access usage:| Metric | Purpose |
|---|---|
| Access Count | How many times PIN used |
| Unique Users | Number of distinct users |
| Completion Rate | How many complete the process |
Best Practices
Clear Instructions
Clear Instructions
Provide clear instructions for external users.
Limited Scope
Limited Scope
Only enable access to what’s necessary.
Time Limits
Time Limits
Consider time-limiting access when appropriate.
Monitor Activity
Monitor Activity
Review external access logs regularly.
Related
Site Registration
Site self-registration process.
Security
Access control overview.
