Organization Policies

Organization policies let admins enforce consistent security rules across all members — from password requirements and two-factor authentication to session timeouts, network restrictions, and data governance. Unlike personal preferences, policies are organization-wide rules that members must follow.

Passwall offers 20+ configurable policies across five categories, available from Team plans and above.

What organization policies are

Policies are admin-defined security controls enforced at the organization level. They differ from personal settings in one critical way: policies are mandatory.

  • Policies enforce security behavior — require 2FA, limit session timeout, restrict exports, block login from unapproved networks, and more.
  • Settings configure organizational defaults and operational preferences (display name, billing, etc.).

This separation matters for compliance. Settings optimize operations; policies reduce risk. When an auditor asks "how do you enforce password complexity across your team?", the answer is policies.

Who can manage policies?

Only organization owners and admins can view and modify policy configuration. Managers and members can see policy impact (e.g., "2FA is required") but cannot change settings.

Authentication & access policies

Control how members authenticate and access the organization vault.

Require Two-Factor Authentication

Team+

Force all organization members to set up two-factor authentication (TOTP, hardware key, or authenticator app). Members without 2FA will be prompted to configure it at their next sign-in and cannot access the vault until they do.

Require SSO Authentication

Enterprise+

Non-owner/admin members must sign in through your configured SAML 2.0 or OpenID Connect provider. Direct email/password login is disabled for non-admin members. This ensures your identity provider remains the single source of truth for authentication.

See the SSO Setup Guide for configuration details.

Requires: Single Organization policy

Master Password Requirements

Team+

Enforce minimum standards for master passwords across the organization. Configurable options:

  • Minimum length — Set a minimum character count (recommended: 12+).
  • Require uppercase — At least one uppercase letter.
  • Require lowercase — At least one lowercase letter.
  • Require numbers — At least one numeric digit.
  • Require special characters — At least one symbol, with configurable minimum count.
  • Minimum complexity score — An overall complexity threshold combining all criteria.
  • Require change on existing passwords — Force members with non-compliant master passwords to update on next sign-in.

Session Timeout

Business+

Define the maximum vault session timeout and what happens when it expires. Options:

  • Max timeout (minutes) — The longest period a vault can stay unlocked while idle.
  • Timeout action — Choose between lock (requires master password to re-enter) or sign out (full re-authentication required).

Requires: Single Organization policy

Remove PIN Unlock

Business+

Disable PIN-based unlock on web, browser extension, and desktop clients. This forces members to use their master password or biometrics, preventing the use of weaker PIN codes for vault access.

Failed Login Limit

Enterprise+

Automatically block IP addresses after too many failed sign-in attempts. Configurable options:

  • Max attempts — Number of failed attempts before blocking (default: 5).
  • Window (minutes) — The time window in which attempts are counted (default: 15 minutes).
  • Block duration (minutes) — How long the IP stays blocked (default: 30 minutes).

This is enforced server-side — blocked IPs receive a clear error message and must wait for the block to expire.

Account Recovery

Business+

Allows admins to reset member master passwords. When enabled, admins can initiate a password reset for any member — critical for when an employee forgets their master password but needs continued access to organization data.

Requires: Single Organization policy

Vault & data policies

Control how data is stored, exported, and owned within the organization.

Single Organization

Business+

Members cannot join or create other organizations while they are part of this one. This is a foundational policy that several other policies depend on — it ensures organizational data boundaries cannot be bypassed by joining a second organization.

Important: This policy is a prerequisite for Session Timeout, Require SSO, Account Recovery, and Default URI Match.

Disable Personal Export

Business+

Non-admin members cannot export vault data to CSV or other formats. This prevents data exfiltration by limiting who can bulk-export credentials. Admins retain export capability for backup and compliance purposes.

Enforce Data Ownership

Enterprise+

Items created within the organization vault belong to the organization, not to individual members. When a member leaves or is removed, their organization items are retained — preventing data loss during offboarding.

Remove Credit Card Type

Business+

Prevents members from creating credit/debit card items in the organization vault. Useful for organizations that handle payment card data separately or need to comply with PCI DSS restrictions on where card data is stored.

Autofill & generator policies

Standardize how members interact with the browser extension and password generation.

Password Generator Requirements

Team+

Enforce minimum requirements for the built-in password generator so that all generated passwords meet your security standards. Options include:

  • Type — Random password or passphrase.
  • Minimum length — For random passwords.
  • Character requirements — Uppercase, lowercase, numbers, special characters.
  • Passphrase options — Minimum word count, capitalize words, include numbers.

Members can still increase requirements above the policy minimum, but cannot go below it.

Activate Autofill

Business+

Automatically enable autofill on page load in the browser extension. When active, the extension will offer to fill credentials without requiring the member to manually trigger it — improving adoption and reducing friction.

Default URI Match Detection

Business+

Set the default URI matching method used by the browser extension across the organization. Options typically include base domain, host, starts with, exact match, and regular expression. This ensures consistent autofill behavior.

Requires: Single Organization policy

Require Autofill Confirmation

Business+

Require members to confirm before the extension autofills credentials on a page. Adds a confirmation step that prevents accidental credential submission on phishing pages or mismatched URLs.

Require Browser Extension

Team+

When new members sign up or are invited, they are required to install the Passwall browser extension as part of onboarding. This ensures consistent credential management and autofill availability across the team.

Network & threat policies

Restrict access based on network conditions and protect against brute-force attacks.

Firewall Rules

Enterprise+

Define rules that restrict organization access based on network criteria. Each rule specifies:

  • Type — IP address, CIDR range, or country.
  • Value — The specific IP, range (e.g., 10.0.0.0/8), or country code.
  • Action — Allow, deny, or report (log only).

Rules are evaluated on every organization API request. Use allowlists for office networks and block known problematic ranges. The "report" action lets you monitor traffic before enforcing blocks.

Block Domain Account Creation

Enterprise+

Prevent users with your claimed email domains from creating Passwall accounts outside of your organization. If your organization owns @yourcompany.com, new sign-ups with that domain will be directed to join your organization instead of creating independent accounts.

Safety note

Always test network policies in "report" mode before switching to "deny". Keep at least one admin with a tested, allowlisted access path before broad rollout. Otherwise, you risk locking out your entire team.

Sharing & Send policies

Control how credentials and secrets are shared inside and outside the organization.

Disable External Sharing

Team+

Prevent members from sharing vault items with users outside the organization. Sharing is limited to shared collections within the organization boundary. This prevents accidental or intentional data leakage to external parties.

Send Options

Business+

Configure organization-wide defaults for Secure Send. Options include controlling whether the sender's email is visible to recipients by default.

Remove Send

Enterprise+

Non-admin members cannot create or edit Secure Send items. This completely disables the Send feature for regular members, while admins retain full access. Use this when your data governance requirements prohibit any external data sharing mechanism.

Plan tiers and availability

Policy availability increases by plan tier, matching controls to organizational maturity and compliance requirements.

PlanAvailable policies
TeamRequire 2FA, Master Password Requirements, Password Generator Requirements, Require Browser Extension, Disable External Sharing
BusinessEverything in Team, plus: Session Timeout, Remove PIN Unlock, Account Recovery, Single Organization, Disable Personal Export, Remove Credit Card Type, Activate Autofill, Default URI Match, Require Autofill Confirmation, Send Options
EnterpriseEverything in Business, plus: Require SSO, Failed Login Limit, Enforce Data Ownership, Firewall Rules, Block Domain Account Creation, Remove Send

Compare plans on the pricing page. Policies are available on all Team, Business, and Enterprise subscription tiers.

Policy dependencies

Some policies depend on other policies being enabled first. Passwall prevents you from enabling a policy unless its prerequisites are met, and warns you if disabling a policy would break dependents.

PolicyRequires
Require SSOSingle Organization
Session TimeoutSingle Organization
Account RecoverySingle Organization
Default URI MatchSingle Organization

What this means in practice

Single Organization is the gateway policy for advanced controls. Once enabled, it prevents members from having accounts in multiple organizations, which makes session, SSO, and recovery policies enforceable. Plan to enable it early in your rollout if you need any of the dependent policies.

Recommended rollout framework

To reduce support tickets and user friction, roll out policies in phases:

  1. Phase 1 — Visibility

    Before enforcing anything, review your current security posture. Check the Security dashboard for password health, 2FA adoption, and breach exposure. Communicate upcoming changes to your team.

  2. Phase 2 — Low-friction controls

    Start with policies that improve security without disrupting workflows: Password Generator Requirements, Require Browser Extension, and Activate Autofill.

  3. Phase 3 — Identity controls

    Enforce Require 2FA and Master Password Requirements. If using SSO, enable Single Organization first, then Require SSO. Give members a grace period to comply.

  4. Phase 4 — Data controls

    Enable Disable Personal Export, Disable External Sharing, and Remove Credit Card Type for teams handling sensitive data. These are especially important for compliance-driven environments.

  5. Phase 5 — Network restrictions

    Test Firewall Rules in "report" mode first. Once you've validated traffic patterns, switch to "deny". Enable Failed Login Limit as a final brute-force protection layer.

Communication checklist

  • Announce each phase at least one week before enforcement.
  • Provide clear instructions for 2FA setup and password changes.
  • Define an emergency access path for admins in case of lockouts.
  • Document exceptions for service accounts or automated workflows.

FAQ and troubleshooting

Why can't I enable a policy?

Two common reasons: (1) your current plan doesn't include this policy tier — check the plan tier badge on the policy card; (2) a prerequisite policy must be enabled first — check the dependency table above.

A policy toggle is greyed out. What does that mean?

Greyed-out toggles indicate the policy is not available on your current plan or a dependency is not met. Hover over the toggle for a tooltip explaining the requirement. Upgrade your plan or enable the prerequisite policy to unlock it.

We enabled a network policy and some users are locked out.

Verify the IP detection path and allowlisted ranges. If users are connecting through VPNs or dynamic IPs, ensure those ranges are included in the allowlist. Use "report" mode to identify all traffic patterns before switching to "deny". Keep at least one admin access path tested at all times.

Can members override organization policies?

No. Organization policies take precedence over personal settings. Members can set stricter personal requirements (e.g., a longer session timeout), but they cannot relax a policy below the organization minimum.

How quickly do policy changes take effect?

Most policies take effect immediately for new sessions. Existing sessions are affected at the next authentication event (sign-in, session refresh, or vault unlock). Server- enforced policies like Failed Login Limit and Firewall Rules apply instantly to all API requests.

Do policies help with SOC 2 / ISO 27001 / HIPAA compliance?

Yes. Policies provide the technical controls auditors look for: enforced 2FA, password complexity, session management, data export restrictions, and network access controls. The policy configuration serves as auditable evidence of your security controls.

Where can I get help with policy rollout?

Visit the Support Center for FAQs and guides, or contact our team for personalized rollout guidance. Enterprise plan customers get priority support with dedicated onboarding assistance.

Start enforcing security standards today

Begin with your highest-risk teams, enable baseline policies, and expand in controlled phases. Your security posture improves with every policy you enable.

Available policies may vary by plan tier and feature rollout. Always validate policy availability in your organization settings before communicating changes to your team.

This guide is maintained for admins, IT leads, and security teams who need practical policy guidance with minimal rollout friction.