Email and password sign-in
Scope
This document defines the standard email and password sign-in flow for Members in a Business Organization.
This flow applies to:
Users invited to an organization
Members without administrative privileges
Authentication is performed using email and password. Additional security verification (if any) is handled by separate security flows.
I am new. Where should I start?
If you are a Member, you do not configure authentication settings.
You only need to:
Use the email address associated with your account
Enter your password
Follow on-screen instructions if additional verification is required
Purpose
This guide helps Members understand:
How to sign in using email and password
What happens during the sign-in process
What to expect after successful authentication
Prerequisites
Before signing in, make sure that:
Your account has been created or you have accepted an invitation
You know your email address and password
Your email address has been verified
I already understand. How do I proceed step by step?
1. Open the Sign-In Page
Step 1: Open the Sign In page.

2. Enter Email and Password
Step 2: Enter your email address and password.
Step 3: Click Sign In.

At this stage:
Credentials are validated
Organization-level security policies are evaluated
3. Authentication Result
Successful Sign-In
You are authenticated successfully
A session is created
You are redirected to your assigned dashboard or workspace

Additional Verification Required (If Applicable)
If your organization enforces additional security checks:
You will be redirected to a separate verification flow (for example: MFA or passkey)
Detailed verification steps are documented separately.
Security Considerations
Passwords are never stored in plain text
Failed sign-in attempts may be rate-limited
Suspicious login behavior may trigger additional verification
Sessions may be revoked if security policies are violated
Important Notes
Members cannot change authentication methods
Password reset is self-service only via Forgot Password
Security policies are enforced automatically by the organization
Access may be denied if:
IP or geo restrictions apply
Device or platform restrictions are enforced
Summary
Item
Member
Sign-In Method
Email & Password
MFA Control
Enforced by organization
Authentication Configuration
❌ Not allowed
Password Reset
✅ Self-service
Administrative Access
❌ No
Last updated