Signing In
How to access your TekToro account and manage authentication.
TekToro supports multiple sign-in methods to balance security and convenience for your organization.
Email and Password
Enter your registered email address and password on the sign-in page. If your account requires email verification, you will need to confirm your email before signing in for the first time.
Password Requirements
Your administrator may enforce password policies including minimum length, special characters, numbers, and uppercase letters. These requirements are displayed on the sign-up and password reset screens.
Microsoft Azure SSO
If your organization uses Microsoft Azure Active Directory, you can sign in with your corporate Microsoft account. Click the Azure sign-in button on the login page to authenticate through your organization's identity provider. TekToro will automatically retrieve your profile information and photo from Microsoft.
Multi-Factor Authentication
When MFA is enabled for your account, you will be prompted to enter a verification code after signing in with your primary credentials.
- Sign in with your email and password (or OAuth provider).
- Open your authenticator app (such as Google Authenticator or Microsoft Authenticator).
- Enter the six-digit code displayed in the app.
- Once verified, you will be redirected to your dashboard.
If you have multiple authenticator factors registered, you can select which one to use. Super administrators are required to have MFA enabled.
Resetting Your Password
If you forget your password:
- Click the Forgot password link on the sign-in page.
- Enter your email address.
- Check your inbox for a password reset link.
- Click the link and set a new password.
Session Management
TekToro keeps you signed in using secure, encrypted cookies. Your session persists across browser tabs and will remain active until you explicitly sign out or your session expires.
Helpful Features
- Last sign-in method — TekToro remembers how you last signed in and displays a hint on your next visit, so you never have to guess which method you used.
- CAPTCHA protection — When configured by your administrator, an invisible CAPTCHA protects the sign-in and sign-up forms from automated abuse.
- CSRF protection — All form submissions are protected against cross-site request forgery attacks.