Signal Ark provides a set of security controls that let workspace Admins enforce authentication standards, manage programmatic access, and maintain a complete record of platform activity. Most security settings are available to all plan tiers; SSO enforcement is a Pro-tier feature.Documentation Index
Fetch the complete documentation index at: https://docs.signalark.app/llms.txt
Use this file to discover all available pages before exploring further.
Single sign-on (SSO)
Pro workspaces can require all team members to authenticate through your company’s Identity Provider (IdP) rather than using email and password. Signal Ark supports the SAML 2.0 standard and works with providers like Okta, Azure AD, Google Workspace, and any other SAML-compliant IdP.Add your IdP metadata
Paste your Identity Provider’s Metadata URL, or upload the XML metadata file directly. Signal Ark uses this to configure the SAML trust relationship.
Map required attributes
Map your IdP’s user attributes to Signal Ark fields. At minimum you need to map Email and Name. Optional attributes include department and job title.
Test the connection
Click Test SSO to verify the configuration with a test login before enforcing it for the whole workspace. Resolve any attribute mapping errors shown in the test result.
API key management
API keys let you connect Signal Ark to external tools, scripts, and automations using the Signal Ark API. Each key is scoped to your workspace and carries the permissions of the Admin who created it.Generating an API key
Name the key
Give the key a descriptive name that identifies what it’s used for (for example, “Zapier integration” or “Internal reporting script”).
Rotating an API key
If a key may have been exposed or you’re rotating keys on a schedule:- Navigate to Settings > Security > API Keys.
- Find the key you want to rotate and click Rotate.
- Signal Ark generates a new key value. Copy it and update your integration before the rotation window closes.
- The old key value is invalidated immediately when you confirm the rotation.
Revoking an API key
To permanently disable a key, click Revoke next to it in the API Keys list. Revocation is immediate and cannot be undone. Any integration using the revoked key will begin receiving401 Unauthorized responses.
Session and password policies
Admins can enforce workspace-wide security policies for non-SSO users under Settings > Security > Policies:Session timeout
Session timeout
Automatically log out inactive users after a configurable period of inactivity. Set the timeout duration in minutes. Members are prompted to re-authenticate when the session expires.
Password requirements
Password requirements
Enforce minimum password length, complexity rules (uppercase, numbers, symbols), and a rotation period (number of days before a password must be changed).
IP allowlisting
IP allowlisting
Restrict Signal Ark access to a defined list of IP addresses or CIDR ranges — useful for requiring team members to connect via a corporate VPN. Add IP ranges under Settings > Security > Policies > IP Allowlist.
Audit trail
Every significant action in Signal Ark is recorded in an immutable audit trail — including data mutations, exports, configuration changes, login events, and security policy updates. The audit trail cannot be edited or deleted by anyone, including Admins.Querying the audit trail
Navigate to Settings > Security > Audit Trail. Use the filters to narrow events by:- Category —
data_mutation,security,export,auth,billing,integration - Actor — filter by a specific team member’s email
- Date range — specify a start and end date
- Account — filter events related to a specific account record
What is logged
| Event type | Examples |
|---|---|
| Authentication | Login, logout, failed login attempt, SSO enforcement change |
| Data mutations | Account created, signal deleted, contact updated |
| Exports | Data export triggered, GDPR portability request processed |
| Security changes | API key generated/rotated/revoked, IP allowlist updated |
| Billing | Plan upgraded/downgraded, credit pack purchased |
| Integrations | CRM connected/disconnected, webhook created/deleted |
Auditor-role users have read-only access to the audit trail and GDPR logs without access to account data — designed for compliance and security review workflows.