PartnerOS provides security controls at both the individual account level and the organization level. Personal security settings — password and two-factor authentication — live under Settings > Password. Organization-wide SSO configuration is available to Admins and Owners under Admin > Security.Documentation Index
Fetch the complete documentation index at: https://docs.partneros.ai/llms.txt
Use this file to discover all available pages before exploring further.
Change your password
You can update your account password at any time. After a successful change, you remain signed in on the current device — other active sessions are not revoked.Set a new password
Enter your new password in the New password field. A strength indicator shows whether the password is Weak, Fair, Good, Strong, or Very strong based on length, uppercase letters, numbers, and special characters. Passwords must be at least 8 characters.
Two-factor authentication (2FA)
Two-factor authentication adds a second layer of verification using a time-based one-time password (TOTP) app such as Google Authenticator, Authy, or 1Password.Enable 2FA
Scan the QR code
Open your authenticator app and scan the QR code displayed on screen. If you cannot scan, copy the text code shown below the QR image and enter it manually in your app.
Disable 2FA
- Go to Settings > Password.
- In the Two-factor authentication section, click Disable 2FA.
- Enter your current password and click Disable 2FA to confirm.
SAML single sign-on (SSO)
Admins and Owners can configure SAML 2.0 SSO to let organization members sign in using your company’s identity provider (IdP), such as Okta, Azure AD, or Google Workspace. This setting is found at Admin > Security.SAML SSO is an organization-level setting. Once configured, members whose email domain matches the configured domain are redirected to your IdP at sign-in.
Required fields
| Field | Description |
|---|---|
| IDP URL (Entry Point) | The SSO URL from your identity provider — must start with https://. |
| IDP Entity ID / Issuer | The unique identifier of your IdP, found in the IdP metadata. For Okta, this is the Identity Provider Issuer field (e.g. http://www.okta.com/exk...). |
| Public Certificate (X.509) | The signing certificate from your IdP, in PEM format (-----BEGIN CERTIFICATE----- … -----END CERTIFICATE-----). |
| Domain(s) | The email domain(s) that trigger SSO login. Separate multiple domains with commas (e.g. company.com,subsidiary.com). |
Configure SAML SSO
Open Admin Security
Navigate to Admin > Security. The SAML single sign-on card shows either Enabled or Not configured.
Copy your SP metadata to your IdP
Copy the SSO URL (ACS) and Entity ID values from the Service Provider Metadata section and paste them into the corresponding fields in your identity provider’s SAML app configuration.
Enter your IdP details
Fill in the IDP URL, IDP Entity ID, Public Certificate, and Domain(s) fields using values from your IdP.
After enabling SSO, test the sign-in flow with one account before notifying your team. Users whose domain matches will be redirected to your IdP automatically when they sign in.