SSO & Authentication
Configure Single Sign-On with Google, GitHub, or SAML for your organization.
Authentication Methods
Document Stack supports multiple ways to authenticate:
- Email & password — Traditional email-based login
- Email OTP — Passwordless login via one-time code
- Google OAuth — Sign in with Google
- GitHub OAuth — Sign in with GitHub
- SAML SSO — Enterprise single sign-on (Enterprise plan)
Social Login (Google & GitHub)
Social login is available to all users on all plans. When a user signs in with Google or GitHub for the first time, a Document Stack account is automatically created linked to their social profile.
- Profile name and avatar are imported from the social provider
- Email is verified automatically
- Users can link additional social accounts from Account Settings
Users who signed up with email can connect their Google or GitHub account later for faster sign-in. Go to Account Settings → Connected Accounts.
Passwordless Email OTP
Users can sign in without a password by requesting a one-time verification code sent to their email:
- On the sign-in page, click Sign in with Email
- Enter your email address
- Check your inbox for a 6-digit verification code
- Enter the code to sign in
OTP codes expire after 10 minutes. Each code can only be used once.
SAML SSO (Enterprise)
Enterprise organizations can configure SAML-based Single Sign-On to enforce authentication through their identity provider (IdP).
Supported Identity Providers
- Okta
- Azure Active Directory (Microsoft Entra ID)
- Google Workspace
- OneLogin
- Any SAML 2.0 compliant IdP
Setting Up SAML
- Go to Settings → Security → SSO Configuration
- Click Configure SAML
- Enter your IdP's metadata URL or upload the metadata XML
- Copy the Document Stack ACS URL and Entity ID into your IdP
- Test the connection
- Enable SAML for your organization
SAML Configuration Values
text
ACS URL: https://api.documentstack.dev/api/auth/saml/callback
Entity ID: https://api.documentstack.dev/api/auth/saml/metadata
Name ID: Email Address (urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress)Enforce SSO
When you enable SAML SSO enforcement, all team members must sign in through your identity provider. Email/password and social logins are disabled for the organization.Session Management
Document Stack sessions are managed securely:
- Sessions expire after 30 days of inactivity
- Active sessions are refreshed automatically
- Users can view and revoke sessions from Account Settings
- Organization admins can revoke all sessions for a member
Security Best Practices
- Enable SSO for your organization to centralize authentication
- Use strong, unique passwords if using email-based login
- Regularly review active sessions and revoke unused ones
- Remove team members promptly when they leave your organization
Next Steps
- Account Settings — Manage your personal profile
- Security Overview — Document Stack security architecture
- Team Members & Roles — Manage roles and permissions