Skip to main content
Enhance your account security with two-factor authentication (2FA) or streamline access with enterprise Single Sign-On (SSO).

Two-Factor Authentication (2FA)

Add an extra layer of security by requiring a second verification method when logging in.

Enabling 2FA

1

Open security settings

Navigate to Settings → Account → Security
2

Choose 2FA method

Select your preferred authentication method:
  • Authenticator app (recommended)
  • SMS text message
  • Email code
3

Set up authentication

Follow the setup process for your chosen method.For authenticator apps:
  1. Scan the QR code with your app (Google Authenticator, Authy, etc.)
  2. Enter the 6-digit code from your app
  3. Save backup codes
For SMS:
  1. Enter your phone number
  2. Verify with the code sent via text
  3. Save backup codes
For email:
  1. Verify your email address
  2. Codes will be sent to your registered email
  3. Save backup codes
4

Save backup codes

Important: Save your backup codes in a secure location. You’ll need them if you lose access to your primary 2FA method.
Store backup codes:
  • In a password manager
  • Printed and stored securely
  • In a secure note-taking app
5

2FA enabled

Your account is now protected with two-factor authentication.

Using 2FA

When logging in with 2FA enabled:
  1. Enter your email and password
  2. Enter the 6-digit code from your authenticator app, SMS, or email
  3. Check “Trust this device” to skip 2FA for 30 days on this device (optional)
  4. Complete login
Trusted devices are cleared when you change your password or disable 2FA for security reasons.

Managing 2FA

Change 2FA method:
  1. Settings → Security → Two-Factor Authentication
  2. Click “Change Method”
  3. Select new method and complete setup
Disable 2FA:
  1. Settings → Security → Two-Factor Authentication
  2. Click “Disable 2FA”
  3. Confirm with password and current 2FA code
Regenerate backup codes:
  1. Settings → Security → Two-Factor Authentication
  2. Click “Generate New Backup Codes”
  3. Save the new codes securely
Regenerating backup codes invalidates all previous codes.

Troubleshooting 2FA

Solution:
  1. Use a backup code to log in
  2. Go to Security settings
  3. Reconfigure 2FA with a new device
  4. Generate new backup codes
Solution:
  • Ensure you’re using codes from the most recent generation
  • Check for typos (codes are case-sensitive)
  • Verify you haven’t already used the code (single-use only)
  • Contact support if all codes fail
Solution:
  • Check phone has cell signal
  • Verify phone number is correct
  • Check SMS isn’t blocked by carrier
  • Try switching to authenticator app method
  • Use a backup code to access account

Single Sign-On (SSO)

Enterprise Single Sign-On allows organizations to manage authentication centrally through their identity provider.
SSO is available on Enterprise plans only. Contact sales for more information.

Supported identity providers

ZeroTwo supports standard SAML 2.0 and OAuth 2.0 identity providers:
  • Okta
  • Azure Active Directory / Microsoft Entra ID
  • Google Workspace
  • OneLogin
  • Auth0
  • Custom SAML 2.0 providers

Setting up SSO (Admin)

1

Access admin console

Navigate to Organization Settings → Security → Single Sign-On
2

Choose provider

Select your identity provider from the list or choose “Custom SAML 2.0”
3

Configure provider

Enter required information:
  • SSO URL / Login URL
  • Entity ID / Identifier
  • X.509 Certificate
For SAML 2.0: Download ZeroTwo’s metadata or manually configure:
  • ACS URL (Assertion Consumer Service)
  • Entity ID
  • Audience URI
4

Test connection

Use the “Test SSO” button to verify configuration before enabling for all users.
5

Enable SSO

SSO is now active for your organization. Users can log in through your identity provider.

User experience with SSO

When SSO is enabled for your organization:
  1. Go to zerotwo.ai and click “Sign In”
  2. Enter your work email
  3. You’re redirected to your organization’s login page
  4. Authenticate with your company credentials
  5. You’re redirected back to ZeroTwo, logged in
Bookmark your organization’s custom SSO login URL for faster access.

SSO configuration options

Provisioning:
  • Automatic user provisioning (SCIM)
  • Just-in-time (JIT) provisioning
  • Manual user management
Access control:
  • Enforce SSO for all organization members
  • Allow password fallback for admins
  • Configure session timeouts
  • Require re-authentication intervals
Attribute mapping:
  • Map user attributes from IdP to ZeroTwo
  • Assign roles based on IdP groups
  • Sync profile information

SSO security features

Security benefits:
  • Centralized authentication management
  • Single point for access control
  • Consistent password policies
  • Automatic deprovisioning when users leave
  • Audit logging of authentication events
  • Conditional access policies

Troubleshooting SSO

Solutions:
  • Verify SSO configuration in both ZeroTwo and IdP
  • Check certificate is valid and not expired
  • Ensure URLs are correct (no trailing slashes)
  • Test with admin account first
  • Check IdP logs for error details
  • Verify user is assigned to ZeroTwo application in IdP
Solutions:
  • Ensure users are provisioned in ZeroTwo
  • Check IdP application assignment
  • Verify email addresses match
  • Enable JIT provisioning if not using SCIM
  • Check organization SSO settings allow access
Solutions:
  • Verify certificate format (PEM)
  • Ensure certificate includes header/footer
  • Check certificate hasn’t expired
  • Download fresh certificate from IdP
  • Remove extra whitespace or characters

Best practices

1

Use 2FA always

Enable 2FA even if your organization uses SSO for additional security.
2

Save backup codes

Store backup codes securely and update them when regenerated.
3

Use authenticator apps

Authenticator apps are more secure than SMS for 2FA.
4

Regular audits

Periodically review authorized devices and sessions.
5

Test SSO changes

Always test SSO configuration changes with a test account before rolling out to all users.