Skip to main content

Security and authentication

CalKeep ships with multiple auth paths and an Enterprise tier of security policies. This page is the admin-side reference.

Authentication options

CalKeep supports any combination of these per user:

MethodAvailable toNotes
Email + passwordAll usersOptional TOTP MFA on top
Sign in with Microsoft (OIDC)All usersRecommended for Microsoft 365 customers
Magic-link email loginAll usersSingle-use 15-minute link, no password
Passkeys / WebAuthnAll usersYubiKey, Windows Hello, Touch ID, browser passkeys — any FIDO2 authenticator
SAML 2.0 SSOEnterprise tierMicrosoft Entra ID, Okta, OneLogin, etc.
SCIM 2.0 auto-provisioningEnterprise tierAdd/remove users from your IdP, mirrored into CalKeep

Users manage their own auth methods at Settings → Security.

Multi-factor authentication (MFA)

TOTP

Any authenticator app — Authy, Google Authenticator, 1Password, Microsoft Authenticator. Enroll at Settings → Security → Two-factor authentication. CalKeep displays a QR code; scan it with your app and enter the 6-digit code to confirm.

10 single-use recovery codes are shown once at enrollment. Save them somewhere safe — they're your backup if you lose access to your authenticator app.

WebAuthn / passkeys

Add at Settings → Security → Security keys & passkeys. Each authenticator gets a friendly label (e.g., "YubiKey 5 — desk drawer") so you can tell them apart later.

Workspace policy

Admins can require MFA for all admins via Settings → Admin → Security policy. Toggling it on with unenrolled admins returns a list — those admins must enroll before the policy takes effect.

Step-up reauthentication

Sensitive admin actions — IP allowlist edits, force-reenroll, revoking another user's MFA — require a recent MFA verification (default: within the last 5 minutes). If your last verification is older, CalKeep prompts for TOTP or WebAuthn before letting the action proceed.

Trusted devices (adaptive MFA)

After completing MFA on a device, CalKeep can issue a 30-day trusted-device token that skips the second factor on subsequent logins from the same device. You can review and revoke trusted devices at Settings → Security → Trusted devices.

Workspace admins can disable trusted-device issuance entirely (e.g., for regulated environments) at Settings → Admin → Security policy.

Enterprise tier policies

Available on the ENTERPRISE plan:

  • Enforce SSO for all users. Hides the password field on branded login pages — only the SSO button is visible. The workspace owner retains an emergency password path.
  • Custom session timeout. Override the default 7-day JWT lifetime — e.g., set to 60 minutes for sensitive workspaces. Range: 5 minutes to 24 hours.
  • IP allowlist. Restrict workspace access to specified CIDR ranges. CalKeep prevents self-lockout by detecting your current IP before saving.
  • Audit log retention. Default retention is 90 days; Enterprise can extend to 1, 3, or 7 years.
  • WebAuthn attestation policy. Require attestation (direct or enterprise mode) so only trusted authenticator models are accepted.
  • Force re-enrollment. Revoke all WebAuthn credentials older than X days, or below an attestation floor, with one operation. Affected users sign in once and re-enroll a fresh credential.

Configure these at Settings → Admin (admin-only, requires recent MFA).

Audit log

Every security-relevant action writes to the audit log (login, MFA enrollment, policy changes, admin actions). Read at Settings → Audit Log; export as CSV/JSON on Enterprise tier.

Reporting a vulnerability

security@calkeep.com. PGP key on request.