Skip to main content

Settings

Account settings are organized across three tabs: Display, Authentication, and Security. Navigate to Account → Settings to configure them.

Display

  • Default pagination count — the number of items shown per page in portal tables
  • Developer mode — toggle to enable developer-oriented portal features
  • Card view — toggle to display results as cards instead of table rows. Auto-enabled when fewer than 7 results are returned.

Authentication

  • SAML 2.0 SSO — integrate with a SAML identity provider such as Okta for single sign-on. See the SAML setup guide for detailed configuration instructions.
  • OIDC clients — create and manage OpenID Connect clients for federated authentication. Supports Google Cloud Workload Identity Federation, allowing GCP workloads to authenticate to the NetActuate API without static credentials. See the OIDC setup guide for configuration details and examples.

Security

Permission toggles that apply across the account:

  • Allow deletion of services — permit users to delete services
  • Allow cancellation of services — permit users to cancel services
  • Allow rescue — permit users to boot services into rescue mode
  • Allow reboot — permit users to reboot services
  • Allow force shutdown — permit users to force shutdown services
  • Allow VMs to authenticate — let VMs call the API using their own context without an explicit API key. Useful for stateless operating systems like NixOS that need to discover information about their environment at boot.
  • Force two-factor authentication — require all users in the account to enable 2FA
  • Force firewall set — automatically associate a default firewall set with all newly created VMs. Useful when using the VM Interface Firewall to enforce organization-wide rules.
  • Security email — set an email address for your security team to receive notifications for critical account activities
  • Conditional access control — restrict portal login to specific IP subnets (e.g., your corporate network or VPN)

Conditional Access: Adding Allowed Subnets

  1. Navigate to Account → Settings.
  2. Scroll to the Conditional Access section.
  3. Click + Add Subnet.
  4. Enter the IP subnet in CIDR notation (e.g., 203.0.113.0/24).
  5. Click Save.

⚠️ Make sure your current IP address is within an allowed subnet before saving. If you save a configuration that excludes your own IP, you will be locked out of the portal. Contact support if this happens.


Need Help?

Contact support@netactuate.com or open a support ticket from the portal.