Security and access
Manage account security and access.
Zuletzt aktualisiert
War das hilfreich?
Manage account security and access.
Zuletzt aktualisiert
War das hilfreich?
Polyteia provides comprehensive login protection and a finely tuned permission system to ensure security on the platform. Access to every resource - whether it's a workspace, file, report, or dataset - requires an explicit invitation.
This approach may seem restrictive at first, but it provides full control over who can view or edit which information.
Polyteia supports three secure login procedures:
One-time code via email (OTP)
Default method – a 6-digit one-time code is sent to your email inbox every time you try to login
✕
Password
Optional method – set a static password for your account
✓
TOTP (2FA)
Second factor via authenticator app (recommended)
✓
For optimal security, we recommend activating all options:
Password as an additional login method
TOTP for strong two-factor protection
This combination ensures that access remains protected even if one method is compromised.
TOTP (time-based one-time code) generates new access codes every 30 seconds through an authenticator app such as:
TOTP is considered particularly secure because:
Codes are generated offline on your device
Each code is only valid for a short time
Login without your device is not possible even if your password is stolen
You can activate TOTP under Settings → Account → Authenticator App.
Polyteia follows a strict invitation-based access model. A user account alone does not grant access.
Each resource requires explicit authorization. Examples:
View workspace
Member of the workspace
Open solution
Member of the solution
Explore dataset
Permission as Editor
or Owner
This model minimizes risks and meets data protection requirements.
Polyteia's role system enables precise access control at all levels:
Organization roles: Administrator and member roles for managing platform-wide settings
Resource roles: Viewer, editor, and owner roles for datasets, evaluations, and other resources
Sharing options: Grant access specifically to individuals or groups with appropriate permissions
Every action – whether viewing a chart or editing a dataset – is governed by roles. This implements the principle of least privilege and ensures traceability of all access rights.