Need help?

Quickly find answers to your questions.

What method is used to protect user credentials?

When using the built‑in username‑and‑password authentication mechanism, user credentials are securely hashed and stored within our cloud infrastructure. The specific hashing algorithm used is not disclosed for security reasons.

If you prefer to avoid storing credentials in our cloud environment, we recommend implementing Single Sign‑On (SSO) using either OIDC or SAML 2.0, which allows authentication to be fully managed by your own identity provider.