Account management
Securely authenticate in Polyteia
Zuletzt aktualisiert
War das hilfreich?
Securely authenticate in Polyteia
Zuletzt aktualisiert
War das hilfreich?
Your Polyteia account serves as your personal key to the platform, determining your login process, identity security, and organization affiliations. Each account is associated with a single email but can belong to multiple organizations, each featuring unique profiles, roles, and permissions.
Access to the platform is strictly regulated. You must be explicitly invited to each workspace, dataset, or report that you need access to. Together with secure login methods and flexible roles, this ensures that access is always intentional and traceable.
Your account contains your email address and login settings. You can change your email address, set or change a password, and delete your account at any time. Account actions apply across organizations.
In each organization, a personal profile is assigned to you. This profile displays your visible name within the organization and includes an option to leave. You manage your profiles individually for each organization.
Login is protected by default through one-time codes via email. For additional security, you can also set a password and activate TOTP (time-based one-time passwords) through an authenticator app. We recommend activating all three methods to ensure maximum security. Access to resources is governed by a detailed permission model that enables secure and targeted access at all levels.
Personal Access Keys (PAKs) allow you to authenticate via the API without using your password. You can create time-limited keys and individually set their validity and permissions. Access keys can be revoked at any time.
Currently, Polyteia sends notifications exclusively via email. In-app notifications will come soon.
Each person has full control over their own account settings and security measures. They can set or change their password, activate or update TOTP (two-factor authentication), and manage personal access keys for secure API access. They can also change their profile name, update their email address for login, leave an organization, or permanently delete their account. System-assigned properties such as roles within an organization cannot be changed independently. All actions can be performed independently and do not require administrator approval.