Skip to main content

App Settings: Organization & Security Guide

This guide details the main configuration areas within your organization's settings, covering profile management, security, user access, and document compliance. You can access Settings in the bottom left hand of the app.

P
Written by Phil McKay
Updated over 2 weeks ago

Business & Profile Management

This section manages your organization's core identity and its general visibility on the platform.

SSO Connections

This area is where you view, configure, and manage your organization's Single Sign-On (SSO) integrations.

  • The table displays the Display Name, IDP (Identity Provider), and Status for all configured connections.

Creating a New SSO Connection

This process allows you to link your organization to an external identity provider (like Google or Okta) for seamless user sign-in and provisioning.
โ€‹

Step 1: Start the Connection

  1. Navigate to Settings > SSO Connections.

  2. Click the + New connection button to start the configuration wizard.

Step 2: Configure Details and Select Provider

  1. Set a Display Name: Enter a Display name for your connection (e.g., "Corporate Okta Access"). This name is for your reference and can be edited later.

  2. Select Identity Provider (IDP) Type: Click the Select dropdown menu to choose your identity provider and connection protocol (SAML or OIDC).

    • Common IDPs: Select a pre-configured option like Google SAML, Okta SAML/OIDC, or Entra SAML/OIDC.

    • Custom Connections: For non-listed providers or manual setups, select Custom SAML or Custom OIDC.

  3. If applicable, click Add an external connection to link this setup to a pre-existing external application.

Step 3: Create and Proceed

  • Once the display name and identity provider are selected, click the Create button.

โš ๏ธ Important: The connection type (SAML/OIDC) is permanent upon creation. If you need to change the connection type later, you must delete the current connection and start over.

Business Documents & Terms of Service

Section

Description

Key Actions

Upload Business Documents

Upload required legal, financial, or compliance documents related to your organization.

Click the Upload Files button to open your file browser and select documents.

Account Terms of Service

Review the current legal agreement and terms that govern your use of the platform.

Click the View button to open the full Terms of Service document for review.

Audit Logs

The Audit Logs section provides a historical record of all significant actions, transactions, and system events that occur within your organization's account. This is a critical tool for security, compliance review, and troubleshooting.
โ€‹

Log Table Overview

The table columns provide a detailed breakdown of every event:

Column

Description

Occurred At

The time and date the event took place.

Actor

The entity that initiated the action. This will typically be user (a specific member) or system (an automated process).

Event

The broad category of the activity (e.g., transaction, user_management, login).

Action

The specific operation performed (e.g., completed, created, approved, requested).

Description

A detailed summary of the action, often including relevant IDs or values changed.

Using the Audit Logs

You can easily search, filter, and export the logs to find specific information.

  • Filtering by Date: Use the Filter Date(s) input field to restrict the log entries to a specific time range.

  • Searching: Use the Search... bar to look for keywords across all columns (e.g., searching for a specific user name, invoice number, or action type).

  • Refreshing Data: Click the Audit Logs refresh icon to ensure you are viewing the most recent events.

  • Exporting Data: Click the Export to CSV button to download the entire log (or the currently filtered view) as a spreadsheet file for offline analysis and record-keeping.

  • Navigation: Use the controls at the bottom to adjust the Rows per page and navigate through the different pages of results.

Team

The Team section allows Owners and Admins to view all organization members, invite new users, manage roles, and assign specific permissions (including wallet access).

This table provides a snapshot of all users in your organization.

Column

Description

Name

The user's display name and primary email address.

Role

The organization-wide role assigned to the user (e.g., Owner, Admin, Member).

Joined

The date and time the user joined the organization.

N3XT status

The user's current status on the platform (e.g., Active, M2M for Machine-to-Machine users).

MFA status

The status of Multi-Factor Authentication (MFA) for the user (Enrolled or Not enrolled).

KYC status

The status of the user's Know Your Customer (KYC) verification (Approved, Unknown).

Key Actions from the Overview Screen:

  • Invite New Users: Click the Invite User button to send invitations to new members.

  • Search/Filter: Use the Search members bar to quickly locate a specific team member.

Detailed User Profile

Clicking on any member in the table opens their detailed profile, which is organized into three tabs: Member Info, Wallet Assignments, and Activity.

Tab 1: Member Info

This tab shows the user's general account status and allows Owners/Admins to manage their high-level role and security settings.

Field

Description

Management Action (Owner/Admin only)

Role

The user's organization-wide permission level.

Click the Edit icon to change the user's Role (e.g., changing a Member to an Admin).

Status

The user's current account status (Active, Suspended, etc.).

Click the More Options menuto perform actions like Suspend or Deactivate the user.

Tab 2: Wallet Assignments

This tab allows Owners and Admins to manage the user's access and permissions for specific wallets linked to the organization.

  1. View Wallets: See a list of all assigned wallets, identified by a color/name and the wallet address.

  2. View Permissions: Select a wallet to view the permissions currently granted to the user for that specific asset.

  3. Manage Permissions (Owner/Admin):

    • Click the dropdown menu next to a wallet assignment.

    • Select the desired role for that wallet: reader, writer, approver, or admin.

  4. Remove Assignment (Owner/Admin): Click the Delete icon to remove the user's access to that specific wallet.

Wallets

The Wallets section provides an overview of all digital wallets linked to your organization, their current balances, and detailed settings for each.

Here, you can view a list of all active wallets.

Field

Description

Wallet Name

A unique, user-friendly identifier for the wallet.

Wallet Address

The unique hexadecimal identifier for the digital wallet.

Balance

The current total value held in the wallet.

Key Action:

  • To create a new wallet, click the + Create new wallet button at the bottom of the list.

  • To manage permissions and initiate transactions, click wallet details next to any listed wallet.

Wallet Management

Clicking wallet details brings you to the individual wallet management screen, where you can configure security settings, initiate transactions, and manage user access.

Setting

Description

Key Actions

Approval Required

Toggle On to require that any transaction initiated from this wallet must be approved by an organization Admin or Owner before it is executed.

Toggle: Turn transaction approval On/Off.

Contacts Only

Toggle On to restrict transactions: only businesses or entities saved as a "Contact" within your organization are permitted to transact with this specific wallet.

Toggle: Turn contact restriction On/Off.

Payment

Initiates a transaction to send a payment or request a payment from an external party.

Click the Payment button.

Transfer

Initiates an internal transfer of funds between two wallets owned by your organization.

Click the Transfer button.

Wallet Users & Permissions

This section shows which organization members have access to this specific wallet and what their assigned permissions are.

Column

Description

Name

The name and email of the organization member.

Role

The member's organization-wide role (Owner, Admin, Member).

Permission

The specific permission level for this wallet (Admin, Approver, Writer, Reader).

Key Action:

  • Add User: Click + Add User to grant another organization member access to this wallet.

  • Manage User: Clicking on a user in this list will take you to their Detailed User Profile in the Manage Team section, where you can modify their wallet-specific permission level.

Profile

The Profile section allows you to view and manage all information, security settings, and wallet assignments specific to your own account.

This view displays your core details, including your display name, email, and organization role.

Field

Description

Role

Your assigned organizational role (e.g., Owner, Admin, Member).

Status

Your current account status (Active, Suspended).

Email

Your primary email address used for login and notifications.

Joined

The date and time you joined the organization.

KYC status

The status of your Know Your Customer verification (Approved, Not Approved).

Key Actions

The Profile area is divided into two tabs:

Tab 1: Member Info

  • Managing Email: Click the Copy icon next to your email to quickly copy it to your clipboard.

  • KYC Status: If your KYC status is not Approved, you may see a refresh icon to re-check the status or a prompt to initiate the KYC process.

Tab 2: Wallet Assignments

  • View a comprehensive list of all wallets you have been assigned access to by an Admin or Owner.

  • View your specific Permission level (e.g., Admin, Approver, Reader) for each assigned wallet.

API Keys

The API Keys section allows authorized users (typically Owners and Admins) to view and manage machine-to-machine (M2M) credentials for secure, programmatic access to the platform. These keys are used to generate authorization tokens for non-human applications.

API Key Management

The table lists all created API keys with the following details:

Column

Description

Key ID

The unique identifier for the API key.

Type

The nature of the key (e.g., M2M for machine-to-machine access).

User

The user account that originally created or is associated with the key.

Created

The date and time the key was generated.

Key Actions

  • Rotate Key: Click the Rotate icon next to a key ID to generate a new, replacement key.

Security Note: Rotating keys is a best practice for security and immediately invalidates the old key. The application using the old key will need to be updated with the new key ID and secret to maintain access.

Did this answer your question?