Who should read this: Workspace administrators and account owners responsible for
organizational security policy.Prerequisites: Admin or Account Owner role. An active PlaneConnection workspace.
Two-Factor Authentication (2FA)
Two-factor authentication adds a second verification step after password entry. PlaneConnection supports TOTP-based 2FA (authenticator apps like Google Authenticator, Authy, or 1Password) and SMS-based verification codes.Enable 2FA for your account
Individual users can enable 2FA from their profile settings. As an admin, you can enforce 2FA for all users.Open your authenticator app and scan the QR code displayed on screen. Enter the 6-digit verification code to confirm setup.
Enforce 2FA for all users
To require all workspace members to use two-factor authentication:Toggle Require Two-Factor Authentication to on. Set a Grace Period (in days) to give existing users time to set up their authenticator app before enforcement takes effect.
When 2FA enforcement is enabled with a grace period, users can still sign in without 2FA during
the grace window but see a persistent banner reminding them to set it up. After the grace period
expires, users must complete 2FA setup before accessing any workspace features.
Passkeys
Passkeys provide passwordless authentication using biometrics (fingerprint, face recognition) or hardware security keys. They are phishing-resistant and more secure than passwords.Register a passkey
Your browser prompts you to use your device’s biometric sensor or insert a security key. Follow the on-screen instructions.
Remove a passkey
Navigate to Profile & Security > Passkeys and click the Remove button next to the passkey you want to delete. You must have at least one other authentication method (password or another passkey) to remove a passkey.Session Policies
Session policies control how long users stay signed in and under what conditions sessions expire.Configure session duration
Force sign-out all users
In an emergency (compromised credentials, terminated employee), you can force-expire all active sessions:- Navigate to Settings > Security > Sessions.
- Click Revoke All Sessions.
- Confirm the action.
Password Requirements
PlaneConnection enforces baseline password requirements through its authentication infrastructure. As an admin, you can configure additional policies.Default password rules
All passwords must meet these minimum requirements:- At least 8 characters.
- Cannot be a commonly breached password (checked against known breach databases).
- Cannot be the same as the user’s email address.
Configure additional password policies
Navigate to Settings > Security > Password Policy to enable additional requirements:| Policy | Description |
|---|---|
| Minimum length | Increase the minimum from 8 to up to 32 characters. |
| Require mixed case | Require at least one uppercase and one lowercase letter. |
| Require numbers | Require at least one numeric digit. |
| Require special chars | Require at least one special character (!@#$%^&*). |
| Password history | Prevent reuse of the last N passwords (up to 10). |
Authentication Methods Overview
PlaneConnection supports multiple authentication methods. The following table summarizes availability and configuration:| Method | Default State | Admin Configurable | Notes |
|---|---|---|---|
| Email + Password | Enabled | Cannot disable | Always available as a baseline method. |
| Google OAuth | Feature toggle | Yes | Sign in with Google. Enable via Settings > Modules. |
| Microsoft OAuth | Feature toggle | Yes | Sign in with Microsoft. Enable via Settings > Modules. |
| SAML SSO | Feature toggle | Yes | Enterprise SSO. See Configure SSO. |
| Magic Link | Feature toggle | Yes | Passwordless email link. Enable via Settings > Modules. |
| Passkeys | Feature toggle | Yes | Biometric/hardware key. Enable via Settings > Modules. |
| TOTP 2FA | Opt-in | Enforceable | Authenticator app codes as second factor. |
Security Audit Log
All authentication events are recorded in the workspace audit log:- Sign-in attempts (successful and failed)
- 2FA enrollment and verification
- Passkey registration and removal
- Session creation and revocation
- SSO configuration changes
- Role and permission changes
Related
Configure SSO
Set up SAML-based single sign-on with your identity provider.
Manage Users and Roles
User provisioning, role assignment, and member management.
User Roles Reference
All 24 platform roles and their access scope.
Permissions Matrix
Detailed feature-by-role permissions breakdown.