Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.partneros.ai/llms.txt

Use this file to discover all available pages before exploring further.

PartnerOS provides security controls at both the individual account level and the organization level. Personal security settings — password and two-factor authentication — live under Settings > Password. Organization-wide SSO configuration is available to Admins and Owners under Admin > Security.

Change your password

You can update your account password at any time. After a successful change, you remain signed in on the current device — other active sessions are not revoked.
1

Open password settings

Go to Settings > Password.
2

Enter your current password

Type your existing password in the Current password field.
3

Set a new password

Enter your new password in the New password field. A strength indicator shows whether the password is Weak, Fair, Good, Strong, or Very strong based on length, uppercase letters, numbers, and special characters. Passwords must be at least 8 characters.
4

Confirm and save

Re-enter the new password in Confirm new password and click Update password.
Aim for a password rated Strong or Very strong. Use a mix of uppercase letters, numbers, and special characters, and make it at least 12 characters long.

Two-factor authentication (2FA)

Two-factor authentication adds a second layer of verification using a time-based one-time password (TOTP) app such as Google Authenticator, Authy, or 1Password.

Enable 2FA

1

Open password settings

Go to Settings > Password and find the Two-factor authentication section.
2

Start setup

Click Enable 2FA. Enter your current password to confirm your identity.
3

Scan the QR code

Open your authenticator app and scan the QR code displayed on screen. If you cannot scan, copy the text code shown below the QR image and enter it manually in your app.
4

Verify the setup

Click I’ve scanned the code, then enter the 6-digit code from your authenticator app and click Verify and enable. The 2FA status badge updates to Enabled.

Disable 2FA

Disabling two-factor authentication reduces the security of your account. Only disable it if you intend to switch authenticator apps or if your device is no longer available.
  1. Go to Settings > Password.
  2. In the Two-factor authentication section, click Disable 2FA.
  3. Enter your current password and click Disable 2FA to confirm.

SAML single sign-on (SSO)

Admins and Owners can configure SAML 2.0 SSO to let organization members sign in using your company’s identity provider (IdP), such as Okta, Azure AD, or Google Workspace. This setting is found at Admin > Security.
SAML SSO is an organization-level setting. Once configured, members whose email domain matches the configured domain are redirected to your IdP at sign-in.

Required fields

FieldDescription
IDP URL (Entry Point)The SSO URL from your identity provider — must start with https://.
IDP Entity ID / IssuerThe unique identifier of your IdP, found in the IdP metadata. For Okta, this is the Identity Provider Issuer field (e.g. http://www.okta.com/exk...).
Public Certificate (X.509)The signing certificate from your IdP, in PEM format (-----BEGIN CERTIFICATE----------END CERTIFICATE-----).
Domain(s)The email domain(s) that trigger SSO login. Separate multiple domains with commas (e.g. company.com,subsidiary.com).
PartnerOS also provides read-only Service Provider Metadata — the SSO URL (ACS) and Entity ID — that you enter in your IdP configuration. Use the Copy button next to each field to copy the values.

Configure SAML SSO

1

Open Admin Security

Navigate to Admin > Security. The SAML single sign-on card shows either Enabled or Not configured.
2

Copy your SP metadata to your IdP

Copy the SSO URL (ACS) and Entity ID values from the Service Provider Metadata section and paste them into the corresponding fields in your identity provider’s SAML app configuration.
3

Enter your IdP details

Fill in the IDP URL, IDP Entity ID, Public Certificate, and Domain(s) fields using values from your IdP.
4

Save

Click Enable & save. If the configuration is valid, the card updates to show the Enabled badge. To update an existing configuration, repeat these steps and click Update configuration.
After enabling SSO, test the sign-in flow with one account before notifying your team. Users whose domain matches will be redirected to your IdP automatically when they sign in.