Authentication
Point supports multiple authentication methods to fit your organisation's security requirements.
Authentication Methods
Username and Password
The default authentication method. Users log in with their email address and password.
Password requirements:
- Minimum 12 characters
- At least one uppercase letter
- At least one lowercase letter
- At least one number
- At least one special character
Multi-Factor Authentication (MFA)
MFA adds a second verification step after password entry. Point supports:
- Authenticator App — Microsoft Authenticator, Google Authenticator, or any TOTP-compatible app
- SMS — one-time code sent to a registered mobile number
- Email — one-time code sent to the user's email address
MFA can be configured as:
- Optional — users can choose to enable it
- Required for all users — enforced for everyone
- Required for specific roles — e.g., required for Administrators only
Azure Active Directory (SSO)
Point integrates with Azure AD for Single Sign-On. With SSO:
- Users log in with their existing corporate credentials
- No separate Point password required
- MFA is handled by Azure AD
- User provisioning can be automated via SCIM
Configuring Azure AD SSO
- In Azure AD, register a new Enterprise Application for Point
- Configure the following settings:
| Setting | Value |
|---|---|
| Sign-on URL | https://[your-org].pointgroup.io/auth/sso |
| Identifier (Entity ID) | https://[your-org].pointgroup.io |
| Reply URL | https://[your-org].pointgroup.io/auth/callback |
- Download the Federation Metadata XML from Azure AD
- Send the XML to support@pointgroup.io to complete the configuration
User Provisioning with SCIM
Point supports SCIM 2.0 for automated user provisioning from Azure AD:
- In Azure AD, configure the Point Enterprise Application for provisioning
- Set the Tenant URL to:
https://[your-org].pointgroup.io/scim/v2 - Generate a Secret Token in Point's System Settings → Security → SCIM
- Enter the token in Azure AD
- Configure attribute mappings (Point's support team can provide the mapping template)
Session Management
| Setting | Default | Configurable |
|---|---|---|
| Session Timeout | 8 hours | ✅ Yes (1–24 hours) |
| Remember Me | 30 days | ✅ Yes |
| Concurrent Sessions | Unlimited | ✅ Yes |
| Force Re-authentication | Never | ✅ Yes |
IP Allowlisting
Restrict access to Point to specific IP addresses or ranges:
- Go to System Settings → Security → IP Allowlist
- Click + Add IP Range
- Enter the IP address or CIDR range (e.g.,
192.168.1.0/24) - Add a description (e.g., "Office network")
- Click Save
Test Before Enabling
Before enabling IP allowlisting, ensure your current IP address is in the allowlist. Enabling it without including your IP will lock you out.
API Authentication
For API access, Point uses OAuth 2.0 with client credentials. See API Reference for details.