Skip to main content

Overview

Ekso supports two authentication methods: forms-based login (email and password) and Microsoft Entra ID (single sign-on). You can enable one or both at the same time. Administrators can always sign in with email and password, even if forms authentication is disabled — this prevents system lock-out. Authentication settings are configured under Settings > Authentication.

Forms authentication

Forms authentication lets users sign in with an email address and password. When active, Ekso enforces password policies and optionally requires two-factor authentication.

Password policies

Password policies control the complexity and lifecycle of user passwords.
SettingDescriptionDefault
Password change intervalDays before a password change is required. Set to 0 to disable forced changes.0 (never)
Minimum lengthShortest allowed password8 characters
Maximum lengthLongest allowed password40 characters
Require numberPassword must contain at least one digitOn
Require uppercase letterPassword must contain at least one uppercase letterOn
Require lowercase letterPassword must contain at least one lowercase letterOn
Require symbolPassword must contain at least one symbol (!@#$%^&*()-=_+)Off
Ekso also prevents password reuse — users cannot set a new password that matches their previous password.

Two-factor authentication

When enabled, Ekso sends a verification code to the user’s email address after they enter their password. The user must enter this code to complete sign-in.
SettingDescriptionDefault
Two-factor authenticationEnable or disable 2FAOff
2FA code lengthNumber of digits in the verification code (6–10)6
Two-factor codes are sent by email, not SMS or authenticator app. Make sure your mail configuration is working before enabling 2FA.

Microsoft Entra ID

Microsoft Entra ID (formerly Azure Active Directory) enables single sign-on for organizations on Microsoft 365. Users sign in with their Microsoft account instead of a separate Ekso password. To connect Entra ID, you need:
SettingDescription
Tenant IDYour Microsoft Entra directory ID
Application (client) IDThe app registration ID from your Entra tenant
Use Entra ID if your organization is on Microsoft 365. It removes the need for separate passwords and supports your organization’s conditional access policies.

Setting up Entra ID

1

Register an application

In the Microsoft Entra admin center, go to App registrations+ New registration (or select an existing app). Note the Application (client) ID and Directory (tenant) ID from the app’s overview page.
2

Add API permissions

Click API permissions+ Add a permissionMicrosoft GraphDelegated permissions. Add the following permissions:
PermissionTypeDescriptionAdmin consent
offline_accessDelegatedMaintain access to data you have given it access toNo
openidDelegatedSign users inNo
profileDelegatedView users’ basic profileNo
User.ReadDelegatedSign in and read user profileNo
These are Delegated permissions — they act on behalf of a signed-in user during the SSO login flow. They do not require admin consent. If you also use Ekso’s mailbox connection, the same app registration will need additional Application permissions for mail access.
3

Configure in Ekso

Go to Settings > Authentication > Microsoft Entra and enter the tenant ID and client ID.
4

Enable the integration

Toggle Active on. Users can now sign in with their Microsoft account.
If you disable forms authentication while Entra ID is not properly configured, non-administrator users will be unable to sign in. Administrators can always sign in with email and password as a safety mechanism.

How authentication methods work together

You can run both authentication methods at the same time. When a user signs in:
  • If only forms is active, users sign in with email and password
  • If only Entra is active, users are redirected to Microsoft for sign-in (administrators can still use email and password)
  • If both are active, users can choose either method