Skip to main content

General Settings Configuration

Overview

The General Settings section allows administrators to configure organization-wide preferences that affect all users and system behaviors. These settings control core aspects of your ASCEND deployment including identity, security policies, and session management.

Prerequisites

  • org_admin or Admin role
  • Access to the Admin Console
  • Understanding of your organization's security requirements

Accessing Settings

  1. Navigate to the Admin Console
  2. Select the "Organization" tab
  3. Settings are organized into two sections:
    • Organization Profile
    • Security Settings

Step-by-Step Guide

Configuring Organization Profile

  1. Set Organization Name

    • Enter your organization's display name
    • This appears in emails, reports, and the UI header
    • Maximum 255 characters
  2. View Organization Slug

    • The slug is a URL-safe identifier (read-only)
    • Used in URLs like https://your-slug.ascend.ai
    • Set during initial onboarding and cannot be changed
  3. Select Industry

    • Choose from the dropdown:
      • Financial Services
      • Healthcare
      • Technology
      • Retail
      • Manufacturing
      • Government
      • Other
    • Used for compliance report customization
  4. Configure Contact Emails

    • Primary Contact Email: Main administrative contact
    • Support Email: Technical support communications
  5. Save Changes

    • Click the "Save Changes" button
    • Wait for the success confirmation toast

Configuring Security Settings

  1. Enable MFA Requirement

    • Toggle "Require MFA for all users"
    • When enabled:
      • All users must configure MFA on next login
      • Users cannot access the platform without completing MFA setup
      • Supports TOTP authenticator apps
  2. Enable SSO/SAML

    • Toggle "Enable SSO/SAML"
    • When enabled:
      • Configure your identity provider (IdP) integration
      • Supports SAML 2.0 and OIDC protocols
      • Contact support for IdP configuration assistance
  3. Set Session Timeout

    • Enter timeout value in minutes (5-1440)
    • After inactivity period, users are automatically logged out
    • Recommended values:
      • High security: 15-30 minutes
      • Standard: 60 minutes
      • Extended: 120-480 minutes

Configuration Options

OptionDescriptionDefaultValid Range
Organization NameDisplay name for your organizationSet at onboarding1-255 characters
Organization SlugURL-safe identifierAuto-generatedRead-only
IndustryBusiness sector classificationNot setDropdown selection
Primary EmailMain contact emailAdmin emailValid email
Support EmailTechnical support contactNot setValid email
MFA RequiredEnforce MFA for all usersfalsetrue/false
SSO EnabledAllow identity provider loginfalsetrue/false
Session TimeoutAuto-logout after inactivity605-1440 minutes

Security Settings Details

Multi-Factor Authentication (MFA)

When MFA is required at the organization level:

SettingBehavior
OFFMFA is optional for users
OPTIONALUsers can enable MFA in their profile
ONAll users must have MFA enabled

MFA Enforcement Flow:

  1. Administrator enables organization-wide MFA
  2. On next login, users without MFA are prompted to set up
  3. Users must complete authenticator app configuration
  4. MFA challenge is required on every subsequent login

Supported MFA Methods:

  • Time-based One-Time Password (TOTP)
  • Compatible with Google Authenticator, Authy, 1Password, etc.

Single Sign-On (SSO)

SSO configuration allows integration with enterprise identity providers:

Supported Protocols:

  • SAML 2.0
  • OpenID Connect (OIDC)

Configuration Requirements:

  1. IdP Metadata URL or XML
  2. Entity ID
  3. Assertion Consumer Service (ACS) URL
  4. Certificate for signature validation

SSO Behavior:

  • When enabled, users see "Sign in with SSO" option
  • Password-based login remains available as fallback
  • User provisioning follows IdP attributes

Session Management

Session timeout controls when inactive users are automatically logged out:

Timeout Recommendations by Industry:

IndustryRecommended TimeoutRationale
Financial Services15 minutesPCI-DSS compliance
Healthcare15-30 minutesHIPAA requirements
Government15-30 minutesNIST 800-53 guidance
Technology60 minutesBalance security and usability
General Business60-120 minutesStandard enterprise practice

Session Behavior:

  • Activity resets the timeout timer
  • Warning appears 5 minutes before timeout
  • Users can extend session when prompted
  • Token refresh maintains active sessions

API Reference

Get Organization Details

GET /api/admin/organization
Authorization: Bearer <token>

Response:

{
"id": 1,
"name": "Acme Corporation",
"slug": "acme-corp",
"domain": "acme.com",
"subscription_tier": "business",
"cognito_mfa_configuration": "OPTIONAL",
"created_at": "2026-01-01T00:00:00Z"
}

Update Organization Settings

PATCH /api/admin/organization
Authorization: Bearer <token>
X-CSRF-Token: <csrf_token>
Content-Type: application/json

{
"name": "Updated Organization Name",
"session_timeout_minutes": 30,
"cognito_mfa_configuration": "ON"
}

Response:

{
"success": true,
"message": "Organization updated",
"changes": {
"name": {"old": "Old Name", "new": "Updated Organization Name"},
"cognito_mfa_configuration": {"old": "OPTIONAL", "new": "ON"}
}
}

Best Practices

  1. Document Settings Changes

    • Keep a record of configuration changes and rationale
    • Use audit log exports for compliance evidence
  2. Test Before Enabling MFA

    • Pilot with a small group of users first
    • Ensure help desk is prepared for support requests
  3. Plan SSO Rollout

    • Coordinate with IT/Identity team
    • Test with pilot users before organization-wide deployment
    • Maintain password-based fallback during transition
  4. Balance Security and Usability

    • Shorter session timeouts improve security but may frustrate users
    • Consider user workflows when setting timeout values
  5. Regular Review

    • Audit security settings quarterly
    • Update settings as compliance requirements evolve

Troubleshooting

Settings Not Saving

SymptomPossible CauseSolution
Save button unresponsiveMissing CSRF tokenRefresh page and retry
Error message displayedValidation failureCheck field values meet requirements
Changes not persistingDatabase connection issueContact support

MFA Issues

IssueSolution
Users locked out after MFA enabledTemporarily disable MFA, contact support
TOTP codes not workingVerify device time is synchronized
MFA setup not appearingClear browser cache, try incognito mode

SSO Configuration

IssueSolution
SSO redirect failsVerify IdP metadata URL is accessible
Users cannot log in via SSOCheck attribute mapping configuration
Certificate errorsUpdate IdP certificate in ASCEND settings