Overview
The Authentication tab in Settings lets admins control how members authenticate into Petra. You can restrict which sign-in methods are allowed, require multi-factor authentication, configure Just-in-Time (JIT) provisioning for SSO users, and set up single sign-on (SSO) connections.Only Admins can view and change authentication settings. These settings apply to your entire organization.
Primary Authentication Methods
Petra supports three primary authentication methods. You can enable or disable each one for your organization:- Email Magic Links — Passwordless login via a one-time link sent to the member’s email. This is Petra’s default sign-in method and requires no password setup.
- Passwords — Members can set a password and log in with their email and password combination.
- SSO — Members authenticate through your organization’s identity provider (IdP). Requires an SSO connection to be configured first (see SSO below).
Restricting Auth Methods
By default, both Email Magic Links and Passwords are enabled. You can restrict which methods members are allowed to use. To update allowed auth methods:- Go to Settings → Authentication.
- Under Authentication Methods, toggle the methods you want to allow or disallow.
- Save your changes.
Multi-Factor Authentication (MFA)
Petra supports MFA to add a second layer of verification at sign-in. Members can enroll with an authenticator app (TOTP) or a phone number (SMS).MFA Policy
You can configure whether MFA is optional or required for your organization.- Optional — Members may enroll in MFA but are not required to.
- Required — All members must set up MFA before they can access Petra. Members who have not yet enrolled will be prompted to do so on their next login.
- Go to Settings → Authentication.
- Under Multi-Factor Authentication, select the policy that applies to your organization.
- Save your changes.
Resetting Your MFA Method
If you personally need to switch authenticator apps or change your enrolled phone number, you can reset your own MFA enrollment. This only affects your account — it does not change the MFA policy for other members in your organization. After resetting, you will be signed out and prompted to enroll a new MFA method on your next login. To reset your MFA:- Go to Settings → Authentication.
- Scroll to the Multi-Factor Authentication section at the bottom of the page.
- Click Reset MFA.
- Confirm the action in the dialog.
The Reset MFA option only appears if you currently have an MFA method enrolled. Admins cannot reset MFA on behalf of other members — each member must reset their own.
Just-in-Time (JIT) Provisioning
JIT provisioning automatically creates a Petra account for any user who signs in via SSO, even if they haven’t been explicitly invited. This is useful for organizations where team membership is managed in the identity provider rather than in Petra directly. When a member signs in through SSO for the first time, Petra will automatically create their account and assign them a default role.Enabling JIT Provisioning
- Go to Settings → Authentication.
- Under Just-in-Time Provisioning, enable the toggle.
- Configure the default role that new JIT-provisioned members will be assigned.
Single Sign-On (SSO)
Petra supports SSO via SAML 2.0 and OIDC. Once an SSO connection is configured, members can sign in with their corporate identity provider credentials (e.g., Microsoft Entra ID, Okta, Google Workspace).Setting Up an SSO Connection
- Go to Settings → Authentication.
- Scroll to the Single Sign-On section.
- Click Create SSO Connection.
- Choose SAML or OIDC depending on what your identity provider supports.
- Follow the configuration steps — you’ll need to provide your IdP’s metadata or endpoints, and copy Petra’s ACS URL and entity ID into your IdP.
SAML Configuration
For SAML connections, you will need:- Your identity provider’s SSO URL (also called the SAML endpoint or sign-on URL)
- Your identity provider’s X.509 certificate for token signing
- An ACS (Assertion Consumer Service) URL to configure in your IdP
- An Entity ID / Audience URI to configure in your IdP
OIDC Configuration
For OIDC connections, you will need:- Your identity provider’s Issuer URL (the OpenID configuration endpoint)
- A Client ID and Client Secret from your IdP application
- A Redirect URI to configure in your IdP application
Testing and Activating an SSO Connection
After entering your configuration, Petra will ask you to test the connection before activating it. This verifies that the IdP and Petra are communicating correctly. Once the test succeeds, activate the connection. Members can then select Sign in with SSO on the Petra login page.You can have multiple SSO connections configured. This is useful if your organization has multiple identity providers or is migrating between them.