Skip to main content
Last reviewed: March 5, 2026 Owner: Security + Engineering Review cadence: Quarterly Status: Implemented This standard defines how user authentication controls are enforced, including password policy ownership, MFA, and session protections.

What this standard answers

  • Who owns password policy controls in hosted and self-hosted deployments
  • How authentication is enforced for users and admins
  • What controls are applied when password-based authentication is used

Current state (as of March 5, 2026)

Tero supports SSO and OIDC-capable authentication and enforces authentication and session controls in application access paths.

Authentication and password baseline

AreaRequirement
Primary user authentication modelSSO-capable authentication with SAML 2.0 and OpenID Connect support
Password policy source of truth (SSO)Customer IdP policy controls (complexity, lockout, rotation, MFA policies)
Password handlingPasswords are never stored in source code and are handled through managed identity systems
MFA supportEnforced through customer IdP policy where configured
Administrative accessRestricted administrative access model with scoped authorization
Session controlsSession validation and scoped authorization are enforced in runtime access paths

Supported login and SSO protocols

Method or protocolSupportNotes
Username and passwordSupportedCan be disabled when SSO-only access is required
SSO via SAML 2.0SupportedWorks with major SAML-compatible IdPs
SSO via OpenID ConnectSupportedWorks with major OIDC-compatible IdPs
Multi-factor authentication (MFA)SupportedEnforced through customer IdP policy for SSO; configurable for password-based login
OAuth 2.0 delegated accessSupportedUsed for scoped API/integration authorization paths
LDAPNot a direct authentication protocolLDAP-backed directories are typically integrated through IdP/SSO providers

Automated provisioning and deprovisioning

CapabilitySupport modelNotes
User provisioningSupportedUsers can be created automatically from customer IdP directory-sync integrations
User deprovisioningSupportedUsers can be removed or access revoked automatically when they are removed/disabled in the customer IdP
Inactive-account handlingSupportedInactive user access can be automatically disabled through customer IdP lifecycle policy and/or platform account-lifecycle controls based on deployment configuration
Group-based access mappingSupportedIdP groups can be mapped to product roles/teams for least-privilege access assignment
SCIM transportSupported where configuredSCIM-capable directory-sync paths are supported through identity integrations; provider-native sync paths are also supported

Session timeout and reauthentication settings

Access modeDefault session/reauth behaviorCustomer configurability
SSO (SAML/OIDC)Session timeout and reauthentication follow customer IdP policy defaultsCustomer-configurable in IdP policy (for example idle timeout, max session age, reauth/MFA frequency)
Username/passwordPlatform-managed secure session controls are enforced in application access pathsEnterprise customers can require SSO-only mode; customer-specific session policy requirements are supported during security onboarding

Session binding and network attribute controls

ControlBaseline behaviorCustomer configurability
Device-aware session policyEnforced through customer IdP/conditional-access policy where configuredConfigurable by customer in IdP/device-trust policy
Network/IP-based session restrictionsSupported through customer IdP policy and enterprise network allowlisting controlsConfigurable by customer requirement and deployment model

Enforcement model

  • Authentication is required before access to protected application paths.
  • Authorization is evaluated in tenant and workspace context.
  • Access is removed or adjusted when role and lifecycle state changes.

Hosted vs self-hosted scope

AreaTero-hostedSelf-hosted
Application authentication controlsTero-operatedTero software with customer runtime controls
IdP password and MFA policy settingsCustomer-controlledCustomer-controlled
Runtime identity stack operationsTero-operatedCustomer-operated runtime

Exceptions and governance

Any authentication or password-control exception requires documented risk acceptance, approval, compensating controls, and a time-bound remediation plan. Questions: