Voucherify provides tools that help you protect your account and monitor important activity. Some settings apply only to your user account, while others can be enforced for the whole team. You can manage security settings in two places:Documentation Index
Fetch the complete documentation index at: https://docs.voucherify.io/llms.txt
Use this file to discover all available pages before exploring further.
- My profile > Security for personal settings
- Team settings > Security for account-level rules (account owner only)
Security checklist
To improve the security of your Voucherify account, consider enabling the following features:- Enable two-factor authentication (2FA) for all users
- Configure SAML single sign-on (SSO) with your identity provider
- Review user roles and permissions
- Monitor account activity logs
- Set API usage threshold alerts
- Enable webhook failure notifications
Two-factor authentication
Two-factor authentication (2FA) adds an extra layer of security to the login process. In addition to your password, you must confirm your identity using another verification method.Enforce two-factor authentication for the team
Only the account owner can enforce two-factor authentication for all users. To enable enforcement:- Go to Team settings and open the Security tab.
- Turn on Enforce two-factor authentication.
- Click a start date or select Now.
- Save the changes.
Set up two-factor authentication for your account
Each user configures two-factor authentication in My profile > Security. Voucherify supports the following methods:- Google Authenticator: Use the Google Authenticator app on your mobile device. Scan the QR code or enter the code manually. The app generates a verification code for each login.
- SMS codes: Provide your phone number to receive a one-time verification code by text message each time you log in.
- Backup codes: Voucherify generates ten one-time backup codes. Store them in a safe place and use them only if you cannot access your phone.
Backup codes or SMS codes alone are less secure. Voucherify recommends using Google Authenticator as your main method.
Password management
You can change your password at any time. To update your password:- Go to My profile > Security.
- Click Change password.
- Enter your current password and a new password.
- Save the change.
Single sign-on with SAML
SAML single sign-on (SSO) allows users to log in using a company identity provider instead of a Voucherify password. Voucherify supports providers such as Azure, Auth0, OneLogin, Okta, and PingIdentity.How SAML login works
Before users can log in with SAML:- The user must be added to the SAML application in the identity provider.
- The same user must be invited to the Voucherify dashboard using the same email address.
- Users can log in from the identity provider dashboard or a SAML login page.
- The email address must match the email used in Voucherify.
- Users are not automatically synced from the identity provider to Voucherify. Each user must be created in Voucherify separately.
Enable SAML authentication
To enable SAML:- Create a SAML application in your identity provider.
- Copy the Identity provider entry point URL and the certificate.
- Go to Team settings > Security.
- Enable SAML and paste the required values.
- Save the configuration.
Advanced SAML options
For advanced security setups, you can:- Sign SAML requests.
- Encrypt or decrypt SAML responses.
Provider-specific configuration
Follow the procedures of respective providers.Microsoft Azure (Entra ID)
Microsoft Azure (Entra ID)
To enable Microsoft Azure (Entra ID):
- Open Microsoft Entra admin center.
- Go to Applications > Enterprise applications.
- Select New application.
- Click Microsoft Entra SAML Toolkit.
- Name the application and create it.
- Go to Single sign-on.
- Select SAML.
- Edit Basic SAML Configuration.
- Set Identifier (Entity ID) to your chosen value.
- Add a placeholder Reply URL.
- Add a placeholder Sign-on URL.
- Save the configuration.
- Copy the Login URL.
- In Voucherify, go to Team settings > Security.
- Enable SAML authentication.
- Paste the Login URL into Identity provider entry point URL.
- Download the Base64 certificate from Azure.
- In Voucherify, choose Add certificate.
- Paste the certificate.
- Set Issuer to the same Entity ID.
- Save the configuration.
- Copy the Callback URL from Voucherify.
- Return to Azure and edit Basic SAML Configuration.
- Replace the placeholder Reply and Sign-on URLs with the Callback URL.
- Save changes.
- Assign users or groups in Users and Groups.
- Create matching users in Voucherify with the same email addresses.
- Users log in via the Azure application.
Auth0
Auth0
To enable Auth0:
- Log in to Auth0.
- Go to Applications.
- Select Create application.
- Enter a name.
- Click Regular Web Application.
- Create the application.
- Open Settings.
- Scroll down and open Advanced settings.
- Go to the Endpoints tab.
- Copy the SAML protocol URL.
- In Voucherify, go to Team settings > Security.
- Enable SAML authentication.
- Paste the SAML protocol URL into Identity provider entry point URL.
- In Auth0, open the Certificates tab.
- Copy the Signing certificate.
- In Voucherify, choose Add certificate.
- Paste the certificate and save.
- Save the SAML configuration in Voucherify.
- Copy the Callback URL.
- In Auth0, go to Settings.
- Add the Callback URL to Allowed callback URLs.
- Save changes.
- Open the Addons tab.
- Enable SAML2 Web App.
- Save changes.
- Users log in using the Callback URL.
OneLogin
OneLogin
To enable OneLogin:
- Log in to OneLogin.
- Go to Applications.
- Select Add app.
- Search for SAML Custom Connector (Advanced).
- Add the application.
- (Optional) Set name, icon, and description.
- Save and go to Configuration.
- Set SAML encryption to AES-128-CBC.
- Save changes.
- Go to SSO.
- Copy SAML 2.0 Endpoint (HTTP).
- In Voucherify, go to Team settings > Security.
- Enable SAML authentication.
- Paste the endpoint URL as Identity provider entry point URL.
- Save.
- In OneLogin, open Certificate.
- Copy the X.509 certificate.
- In Voucherify, add the certificate and save.
- Save SAML configuration.
- Copy the Callback URL.
- In OneLogin, paste the URL into ACS URL.
- Save changes.
- Users log in using the Callback URL.
Okta
Okta
To enable Okta:
- Log in to Okta.
- Go to Applications.
- Select Create App Integration.
- Click SAML 2.0.
- Click Next.
- Enter application name and optional logo.
- Click Next.
- In Configure SAML, enter a placeholder Single Sign-On URL.
- Set Audience URI (SP Entity ID).
- Set Name ID format to EmailAddress.
- Set Application username to Email.
- Finish setup.
- Open SAML Signing Certificates.
- View SAML setup instructions.
- Copy Identity provider SSO URL.
- In Voucherify, enable SAML authentication.
- Paste the SSO URL as Entry point URL.
- Copy the X.509 certificate.
- Add the certificate in Voucherify.
- Set Audience to match Okta value.
- Save configuration.
- Copy the Callback URL.
- Edit SAML settings in Okta.
- Replace the placeholder URL with the Callback URL.
- Assign users to the application.
- Users log in using the Callback URL.
PingIdentity (PingID)
PingIdentity (PingID)
To enable PingID:
- Log in to PingID.
- Go to Applications.
- Select Add new application.
- Set application name.
- Click SAML application.
- Select Manual configuration.
- Set placeholder ACS URL.
- Set Entity ID.
- Download the X.509 certificate.
- Copy Initiate SSO URL.
- In Voucherify, enable SAML authentication.
- Paste the Initiate SSO URL as Entry point URL.
- Set Audience.
- Add the certificate.
- Save configuration.
- Copy the Callback URL.
- Return to PingID configuration.
- Replace placeholder ACS URL with Callback URL.
- Edit Attribute mappings.
- Map subject to user ID or username.
- Add email attribute mapping.
- Mark email as required.
- Enable the application.
- Create matching users in PingID and Voucherify.
- Test login using the Callback URL.
Activity logs
Logs help you review account and project activity.Account activity logs
Account activity logs are available in My profile > Security. They include:- Login events.
- Password changes.
- Updates to security settings.
Project audit logs
Project-level activity is available in the Audit log section of the dashboard. Audit logs show:- API requests and responses.
- Request source.
- Related objects such as campaigns or orders.
Monitoring and alerts
Voucherify provides alerts that help you monitor account usage and important events. Alerts do not block access, but they help you react quickly when attention is needed. You can manage alerts in the Notification center.User notifications
These settings apply only to the logged-in user.
- Campaign updates.
- Voucher generation results.
- Imports and exports.
- Background tasks.
- In-app notifications
- Email notifications
- In-app and email notifications
Account-level notifications
These settings apply to the whole account and are managed by the account owner.
- Webhook delivery failures: Alerts when Voucherify cannot successfully deliver a webhook. This helps you detect integration problems and fix failing endpoints.
- API usage thresholds: Alerts when your API usage approaches a defined limit. Setting thresholds helps you react early and avoid reaching account limits that could temporarily block API requests.
- Message limits: Alerts when your account approaches configured messaging limits.
Account-level notifications are informational. They do not block API calls or user access.
Related features
Account security can be combined with the following features.Manage members and roles
Manage members and roles
Control who can access your account, assign roles, and manage permissions for team members.Read members and roles to learn more.
Project settings
Project settings
Go to Project settings to manage API keys, webhooks, brand details and to check usage limits.

