Skip to main content

Authentication

Secure access to the Olympus Cloud platform.

Overview

Olympus Cloud supports multiple authentication methods:

  • Password Authentication - Email and password
  • Multi-Factor Authentication (MFA) - Additional verification
  • Single Sign-On (SSO) - Enterprise identity providers
  • API Keys - Service-to-service authentication

Password Authentication

Password Requirements

RequirementMinimum
Length12 characters
ComplexityUpper, lower, number, special
HistoryCannot reuse recent passwords
ExpirationConfigurable by policy

Logging In

  1. Go to login page
  2. Enter email address
  3. Enter password
  4. Complete MFA if enabled
  5. Access granted

Password Reset

  1. Click Forgot Password
  2. Enter email address
  3. Check email for reset link
  4. Link expires in 1 hour
  5. Create new password

Multi-Factor Authentication

MFA Methods

MethodDescription
Authenticator AppTOTP codes (Google Authenticator, Authy)
SMSText message codes
EmailEmail verification codes
Hardware KeyFIDO2/WebAuthn (YubiKey)
BiometricDevice biometrics (Face ID, Touch ID)

Enabling MFA

  1. Go to Account > Security
  2. Click Enable MFA
  3. Choose method
  4. Follow setup instructions
  5. Save backup codes

Backup Codes

warning

Store your backup codes in a secure location immediately after enabling MFA. If you lose access to both your primary MFA method and your backup codes, account recovery requires administrator intervention.

When enabling MFA:

  • Save backup codes securely
  • Use if primary method unavailable
  • Each code works once
  • Request new codes if depleted

Single Sign-On (SSO)

Supported Providers

ProtocolProviders
SAML 2.0Okta, Azure AD, OneLogin, Ping
OAuth 2.0Google, Microsoft, custom
OIDCAny OIDC-compliant provider

SSO Setup

  1. Go to Organization > Settings > SSO
  2. Select protocol
  3. Enter identity provider details
  4. Configure attribute mapping
  5. Test connection
  6. Enable for users

Just-in-Time Provisioning

With SSO enabled:

  • New users created automatically on first login
  • Attributes synced from identity provider
  • Group memberships mapped to roles

API Authentication

API Keys

For service-to-service authentication:

  1. Go to Settings > API Keys
  2. Click Create Key
  3. Name the key (descriptive)
  4. Set expiration
  5. Copy key (shown once)
  6. Store securely

Key Security

danger

Never embed API keys directly in source code or commit them to version control. Use environment variables or a secrets manager for all credentials.

PracticeDescription
Rotate RegularlyReplace keys periodically
Minimum ScopeOnly needed permissions
Environment VariablesNever in code
Audit UsageMonitor key activity

JWT Tokens

For user-context API calls:

  • Access tokens for API requests
  • Refresh tokens for renewal
  • Short-lived access tokens
  • Secure token storage

Session Management

Session Duration

Session TypeDefault Duration
Web8 hours idle, 24 hours max
Mobile30 days refresh
APIToken-based expiration

Session Security

  • Sessions bound to device/IP
  • Concurrent session limits
  • Forced logout on password change
  • Activity-based extension

Viewing Sessions

  1. Go to Account > Security > Sessions
  2. See all active sessions
  3. Device, location, last activity
  4. Terminate specific sessions

Security Events

Monitored Events

EventLogged
Login SuccessUser, time, location, device
Login FailureReason, attempts
Password ChangeUser, time
MFA EventsSetup, use, bypass
Session EventsCreate, expire, terminate

Login Alerts

Configure alerts for:

  • Login from new device
  • Login from new location
  • Failed login attempts
  • Account locked

Account Security

Account Lockout

TriggerAction
Failed LoginsTemporary lockout after threshold
Suspicious ActivityManual or automatic lock
Policy ViolationAdmin lock

Unlocking Accounts

For locked accounts:

  1. Wait for lockout period
  2. Use password reset
  3. Contact administrator
  4. Admin unlocks in portal

Best Practices

For Users

  • Use strong, unique passwords
  • Enable MFA
  • Don't share credentials
  • Log out on shared devices
  • Review active sessions regularly

For Administrators

  • Require MFA for all users
  • Implement SSO where possible
  • Review authentication logs
  • Set appropriate session timeouts
  • Conduct regular access reviews

Troubleshooting

Common Issues

IssueSolution
Can't log inCheck email/password, reset if needed
MFA not workingSync device time, use backup codes
SSO failingCheck IdP status, verify configuration
Session expiredLog in again