Single Sign-on (SSO) and Two-factor Authentication (2FA)
Secure authentication with Single Sign-On and two-factor verification to protect system access while simplifying user login.
Single sign-on (SSO)
Tactiv’s platform supports Single Sign-On (SSO) to simplify secure access across your organisation. Users can sign in using their existing corporate credentials, reducing the need to manage multiple usernames and passwords while maintaining strong identity controls.
By integrating with your organisation’s identity provider, SSO ensures user authentication is handled through trusted enterprise security frameworks. Access policies, password standards and user lifecycle management remain governed by your organisation’s existing IT controls, while still enabling secure access to the platform.
Each login follows a controlled authentication process, ensuring:
-
Users authenticate through trusted organisational identity systems
-
Password policies and security controls are centrally enforced
-
User access can be managed through existing identity management processes
-
Authentication activity is traceable and auditable
The Result:
Simplified user access, stronger identity governance, and reduced administrative overhead while maintaining enterprise-grade security across the platform.
Two-factor authentication (2FA)
Tactiv’s platform supports two-factor authentication (2FA) to provide an additional layer of security when accessing sensitive funding data and system functions. By requiring a second form of verification, organisations can significantly reduce the risk of unauthorised access.
When 2FA is enabled, users must verify their identity using a secondary authentication factor—such as a one-time code—after entering their login credentials. This ensures that even if passwords are compromised, access to the platform remains protected.
Each login follows a reinforced security process, ensuring:
User access requires both credentials and a secondary verification factor
Sensitive data and platform functionality are protected from unauthorised access
Authentication attempts are recorded and auditable
Security policies can enforce multi-factor authentication across users
The result:
Enhanced security for user accounts and sensitive funding data, providing organisations with greater confidence that system access is protected.
Email domain integration
Streamline user access and onboarding with email domain integration. Tactiv can recognise approved organisational domains, allowing administrators to automatically associate users with their organisation and apply relevant access rules.
This simplifies account management while ensuring users from trusted organisations are granted the appropriate permissions without manual configuration.
Roles and permissions
Define user roles that reflect how teams interact with the platform. Roles can be configured for administrators, program managers, assessors, finance teams and external stakeholders—each with clearly defined capabilities.
Role-based permissions ensure users can perform the tasks required for their responsibilities while maintaining strong control over system access and sensitive information.
Learn more about Team Management and Delegations >
Custom security permissions
Extend standard roles with highly configurable security controls. Tactiv allows organisations to tailor permissions down to specific modules, actions or data elements, supporting complex governance and compliance requirements.
Administrators can adjust permissions as programs evolve, ensuring security settings remain aligned with organisational policies and operational needs.
You’re in good company