- My profile > Security for personal settings
- Team settings > Security for account-level rules (admin only)
Two-factor authentication
Two-factor authentication (2FA) adds an extra step to the login process. In addition to your password, you must confirm your identity using a second method.Enforce two-factor authentication for the team
Only the account owner can enforce two-factor authentication for all users. To enable enforcement:- Go to Team settings and open the Security tab
- Turn on Enforce two-factor authentication
- Choose a start date or select Now
- Save the changes
Set up two-factor authentication for your account
Each user configures two-factor authentication in My profile > Security. Voucherify supports the following methods:Google Authenticator
Google Authenticator
Use the Google Authenticator app on your mobile device. Scan the QR code or enter the code manually. The app generates a verification code for each login.
SMS codes
SMS codes
Provide your phone number to receive a one-time verification code by text message each time you log in.
Backup codes
Backup codes
Voucherify generates ten one-time backup codes. Store them in a safe place and use them only if you cannot access your phone.
Backup codes or SMS codes alone are less secure. Voucherify recommends using Google Authenticator as your main method.
Password management
You can change your password at any time. To update your password:- Go to My profile > Security
- Choose Change password
- Enter your current password and a new password
- Save the change
Single sign-on with SAML
SAML single sign-on (SSO) allows users to log in using a company identity provider instead of a Voucherify password. Voucherify supports providers such as Azure, Auth0, OneLogin, Okta, and PingIdentity.How SAML login works
- Users log in from the identity provider dashboard or a SAML login page
- The email address must match the email used in Voucherify
- Users are not automatically synced from your identity provider to Voucherify. Each user must be created in Voucherify separately
Enable SAML authentication
To enable SAML:- Create a SAML application in your identity provider
- Copy the Identity provider entry point URL and the certificate
- Go to Team settings > Security
- Enable SAML and paste the required values
- Save the configuration
Advanced SAML options
For advanced security setups, you can:- sign SAML requests
- encrypt or decrypt SAML responses
Provider-specific configuration
Microsoft Azure (Entra ID)
Microsoft Azure (Entra ID)
- Open Microsoft Entra admin center
- Go to Applications > Enterprise applications
- Select New application
- Choose Microsoft Entra SAML Toolkit
- Name the application and create it
- Go to Single sign-on
- Select SAML
- Edit Basic SAML Configuration
- Set Identifier (Entity ID) to your chosen value
- Add a placeholder Reply URL
- Add a placeholder Sign-on URL
- Save the configuration
- Copy the Login URL
- In Voucherify, go to Team settings > Security
- Enable SAML authentication
- Paste the Login URL into Identity provider entry point URL
- Download the Base64 certificate from Azure
- In Voucherify, choose Add certificate
- Paste the certificate
- Set Issuer to the same Entity ID
- Save the configuration
- Copy the Callback URL from Voucherify
- Return to Azure and edit Basic SAML Configuration
- Replace the placeholder Reply and Sign-on URLs with the Callback URL
- Save changes
- Assign users or groups in Users and Groups
- Create matching users in Voucherify with the same email addresses
- Users log in via the Azure application
Auth0
Auth0
- Log in to Auth0
- Go to Applications
- Select Create application
- Enter a name
- Choose Regular Web Application
- Create the application
- Open Settings
- Scroll down and open Advanced settings
- Go to the Endpoints tab
- Copy the SAML protocol URL
- In Voucherify, go to Team settings > Security
- Enable SAML authentication
- Paste the SAML protocol URL into Identity provider entry point URL
- In Auth0, open the Certificates tab
- Copy the Signing certificate
- In Voucherify, choose Add certificate
- Paste the certificate and save
- Save the SAML configuration in Voucherify
- Copy the Callback URL
- In Auth0, go to Settings
- Add the Callback URL to Allowed callback URLs
- Save changes
- Open the Addons tab
- Enable SAML2 Web App
- Save changes
- Users log in using the Callback URL
OneLogin
OneLogin
- Log in to OneLogin
- Go to Applications
- Select Add app
- Search for SAML Custom Connector (Advanced)
- Add the application
- (Optional) Set name, icon, and description
- Save and go to Configuration
- Set SAML encryption to AES-128-CBC
- Save changes
- Go to SSO
- Copy SAML 2.0 Endpoint (HTTP)
- In Voucherify, go to Team settings > Security
- Enable SAML authentication
- Paste the endpoint URL as Identity provider entry point URL
- Save
- In OneLogin, open Certificate
- Copy the X.509 certificate
- In Voucherify, add the certificate and save
- Save SAML configuration
- Copy the Callback URL
- In OneLogin, paste the URL into ACS URL
- Save changes
- Users log in using the Callback URL
Okta
Okta
- Log in to Okta
- Go to Applications
- Select Create App Integration
- Choose SAML 2.0
- Click Next
- Enter application name and optional logo
- Click Next
- In Configure SAML, enter a placeholder Single Sign-On URL
- Set Audience URI (SP Entity ID)
- Set Name ID format to EmailAddress
- Set Application username to Email
- Finish setup
- Open SAML Signing Certificates
- View SAML setup instructions
- Copy Identity provider SSO URL
- In Voucherify, enable SAML authentication
- Paste the SSO URL as Entry point URL
- Copy the X.509 certificate
- Add the certificate in Voucherify
- Set Audience to match Okta value
- Save configuration
- Copy the Callback URL
- Edit SAML settings in Okta
- Replace the placeholder URL with the Callback URL
- Assign users to the application
- Users log in using the Callback URL
PingIdentity (PingID)
PingIdentity (PingID)
- Log in to PingID
- Go to Applications
- Select Add new application
- Set application name
- Choose SAML application
- Select Manual configuration
- Set placeholder ACS URL
- Set Entity ID
- Download the X.509 certificate
- Copy Initiate SSO URL
- In Voucherify, enable SAML authentication
- Paste the Initiate SSO URL as Entry point URL
- Set Audience
- Add the certificate
- Save configuration
- Copy the Callback URL
- Return to PingID configuration
- Replace placeholder ACS URL with Callback URL
- Edit Attribute mappings
- Map subject to user ID or username
- Add email attribute mapping
- Mark email as required
- Enable the application
- Create matching users in PingID and Voucherify
- Test login using the Callback URL
Activity logs
Logs help you review account and project activity.Account activity logs
Account activity logs are available in My profile > Security. They include:- login events
- password changes
- updates to security settings
Project audit logs
Project-level activity is available in the Audit log section of the dashboard. Audit logs show:- API requests and responses
- request source
- related objects such as campaigns or orders
Monitoring and alerts
Voucherify provides alerts that help you monitor account usage and important events. Alerts do not block access, but they help you react quickly when attention is needed. You can manage alerts in the Notification center.User notifications
User notifications relate to project activity and background processes. These settings apply only to the logged-in user. You can manage them in: Notifications (sidebar) → Go to Notification center → User settings Examples include:- campaign updates
- voucher generation results
- imports and exports
- background tasks
- some are in-app only
- some support email
- some support both
Account-level notifications
Account-level notifications relate to system limits and technical delivery. These settings apply to the whole account and are managed by admins. You can manage them in: Notifications (sidebar) → Go to Notification center → Account settings Examples include:- API usage thresholds
- message limits
- failed webhook callouts
Account-level notifications are informational. They do not block API calls or user access.
Related features
Manage users and roles
Manage users and roles
Control who can access your account, assign roles, and manage permissions for team members.
Project settings
Project settings
Manage API keys, webhooks, and usage limits that affect account access and monitoring.

