Enterprise Auth & SSO
Your IT team shouldn't have to argue about SAML with every vendor. Toretto ships with the session, password, and SSO controls enterprise customers expect — configured from a single settings page, with every change recorded for your next audit.
What you get
Session policy
Set max session lifetime and idle timeout per org. Platform ceiling is 24 hours — no exceptions, no knobs that let a future contributor bypass it.
Password policy
Rotation cadence (30 / 60 / 90 / 180 / 365 / never), length + complexity rules, MFA-required toggle. Enforced by Clerk on every sign-in.
SAML 2.0 + OIDC SSO
First-class wizards for Okta, Microsoft Entra ID, and Google Workspace. Any compliant IdP works through Custom SAML / Custom OIDC.
Append-only audit log
Every session, password, and SSO change captures actor + timestamp + before/after. Exported in the SOC 2 evidence bundle. Enforced at the database level — UPDATE / DELETE raise.
Why it matters
- Close enterprise deals without custom work. The IT-security questionnaire every mid-market shipper sends includes “configurable session TTL”, “password rotation”, and “SSO against our IdP”. Shipping all three out of the box is the difference between a smooth pilot and a 6-week integration ticket.
- SOC 2 evidence by construction. The append-only audit log is exactly what an auditor wants for CC6.1 (logical access controls). No after- the-fact log scraping required.
- Delegate auth to your security lead.
auth_policy:viewandauth_policy:manageare distinct fromorg:settings. Your IT lead can own the auth posture without inheriting branding + billing scope they don't need. - No custom auth code on your side. We use Clerk's hosted auth. You configure the policy; the platform implements it. No SAML library to audit, no password-hash storage to worry about.
Supported IdPs
Okta
Microsoft Entra ID
(Active Directory)
Google Workspace
Custom SAML 2.0
Custom OIDC
Okta / Entra / Google ship with stepwise setup wizards (screenshots + labels matching the IdP's admin console). Custom SAML / OIDC paths expose the raw entity ID and ACS URL so any compliant IdP works.
Available on the Enterprise plan. Session
and password policy are available on every plan. SSO
connections require Enterprise — the upgrade path is
self-serve from /settings/billing, no sales
call required.