Organization Policies
Organization policies let admins enforce consistent security rules across all members — from password requirements and two-factor authentication to session timeouts, network restrictions, and data governance. Unlike personal preferences, policies are organization-wide rules that members must follow.
Passwall offers 20+ configurable policies across five categories, available from Team plans and above.
What organization policies are
Policies are admin-defined security controls enforced at the organization level. They differ from personal settings in one critical way: policies are mandatory.
- Policies enforce security behavior — require 2FA, limit session timeout, restrict exports, block login from unapproved networks, and more.
- Settings configure organizational defaults and operational preferences (display name, billing, etc.).
This separation matters for compliance. Settings optimize operations; policies reduce risk. When an auditor asks "how do you enforce password complexity across your team?", the answer is policies.
Who can manage policies?
Only organization owners and admins can view and modify policy configuration. Managers and members can see policy impact (e.g., "2FA is required") but cannot change settings.
Authentication & access policies
Control how members authenticate and access the organization vault.
Require Two-Factor Authentication
Team+Force all organization members to set up two-factor authentication (TOTP, hardware key, or authenticator app). Members without 2FA will be prompted to configure it at their next sign-in and cannot access the vault until they do.
Require SSO Authentication
Enterprise+Non-owner/admin members must sign in through your configured SAML 2.0 or OpenID Connect provider. Direct email/password login is disabled for non-admin members. This ensures your identity provider remains the single source of truth for authentication.
See the SSO Setup Guide for configuration details.
Requires: Single Organization policy
Master Password Requirements
Team+Enforce minimum standards for master passwords across the organization. Configurable options:
- Minimum length — Set a minimum character count (recommended: 12+).
- Require uppercase — At least one uppercase letter.
- Require lowercase — At least one lowercase letter.
- Require numbers — At least one numeric digit.
- Require special characters — At least one symbol, with configurable minimum count.
- Minimum complexity score — An overall complexity threshold combining all criteria.
- Require change on existing passwords — Force members with non-compliant master passwords to update on next sign-in.
Session Timeout
Business+Define the maximum vault session timeout and what happens when it expires. Options:
- Max timeout (minutes) — The longest period a vault can stay unlocked while idle.
- Timeout action — Choose between lock (requires master password to re-enter) or sign out (full re-authentication required).
Requires: Single Organization policy
Remove PIN Unlock
Business+Disable PIN-based unlock on web, browser extension, and desktop clients. This forces members to use their master password or biometrics, preventing the use of weaker PIN codes for vault access.
Failed Login Limit
Enterprise+Automatically block IP addresses after too many failed sign-in attempts. Configurable options:
- Max attempts — Number of failed attempts before blocking (default: 5).
- Window (minutes) — The time window in which attempts are counted (default: 15 minutes).
- Block duration (minutes) — How long the IP stays blocked (default: 30 minutes).
This is enforced server-side — blocked IPs receive a clear error message and must wait for the block to expire.
Account Recovery
Business+Allows admins to reset member master passwords. When enabled, admins can initiate a password reset for any member — critical for when an employee forgets their master password but needs continued access to organization data.
Requires: Single Organization policy
Vault & data policies
Control how data is stored, exported, and owned within the organization.
Single Organization
Business+Members cannot join or create other organizations while they are part of this one. This is a foundational policy that several other policies depend on — it ensures organizational data boundaries cannot be bypassed by joining a second organization.
Important: This policy is a prerequisite for Session Timeout, Require SSO, Account Recovery, and Default URI Match.
Disable Personal Export
Business+Non-admin members cannot export vault data to CSV or other formats. This prevents data exfiltration by limiting who can bulk-export credentials. Admins retain export capability for backup and compliance purposes.
Enforce Data Ownership
Enterprise+Items created within the organization vault belong to the organization, not to individual members. When a member leaves or is removed, their organization items are retained — preventing data loss during offboarding.
Remove Credit Card Type
Business+Prevents members from creating credit/debit card items in the organization vault. Useful for organizations that handle payment card data separately or need to comply with PCI DSS restrictions on where card data is stored.
Autofill & generator policies
Standardize how members interact with the browser extension and password generation.
Password Generator Requirements
Team+Enforce minimum requirements for the built-in password generator so that all generated passwords meet your security standards. Options include:
- Type — Random password or passphrase.
- Minimum length — For random passwords.
- Character requirements — Uppercase, lowercase, numbers, special characters.
- Passphrase options — Minimum word count, capitalize words, include numbers.
Members can still increase requirements above the policy minimum, but cannot go below it.
Activate Autofill
Business+Automatically enable autofill on page load in the browser extension. When active, the extension will offer to fill credentials without requiring the member to manually trigger it — improving adoption and reducing friction.
Default URI Match Detection
Business+Set the default URI matching method used by the browser extension across the organization. Options typically include base domain, host, starts with, exact match, and regular expression. This ensures consistent autofill behavior.
Requires: Single Organization policy
Require Autofill Confirmation
Business+Require members to confirm before the extension autofills credentials on a page. Adds a confirmation step that prevents accidental credential submission on phishing pages or mismatched URLs.
Require Browser Extension
Team+When new members sign up or are invited, they are required to install the Passwall browser extension as part of onboarding. This ensures consistent credential management and autofill availability across the team.
Network & threat policies
Restrict access based on network conditions and protect against brute-force attacks.
Firewall Rules
Enterprise+Define rules that restrict organization access based on network criteria. Each rule specifies:
- Type — IP address, CIDR range, or country.
- Value — The specific IP, range (e.g.,
10.0.0.0/8), or country code. - Action — Allow, deny, or report (log only).
Rules are evaluated on every organization API request. Use allowlists for office networks and block known problematic ranges. The "report" action lets you monitor traffic before enforcing blocks.
Block Domain Account Creation
Enterprise+Prevent users with your claimed email domains from creating Passwall accounts outside of your organization. If your organization owns @yourcompany.com, new sign-ups with that domain will be directed to join your organization instead of creating independent accounts.
Safety note
Always test network policies in "report" mode before switching to "deny". Keep at least one admin with a tested, allowlisted access path before broad rollout. Otherwise, you risk locking out your entire team.
Sharing & Send policies
Control how credentials and secrets are shared inside and outside the organization.
Disable External Sharing
Team+Prevent members from sharing vault items with users outside the organization. Sharing is limited to shared collections within the organization boundary. This prevents accidental or intentional data leakage to external parties.
Send Options
Business+Configure organization-wide defaults for Secure Send. Options include controlling whether the sender's email is visible to recipients by default.
Remove Send
Enterprise+Non-admin members cannot create or edit Secure Send items. This completely disables the Send feature for regular members, while admins retain full access. Use this when your data governance requirements prohibit any external data sharing mechanism.
Plan tiers and availability
Policy availability increases by plan tier, matching controls to organizational maturity and compliance requirements.
| Plan | Available policies |
|---|---|
| Team | Require 2FA, Master Password Requirements, Password Generator Requirements, Require Browser Extension, Disable External Sharing |
| Business | Everything in Team, plus: Session Timeout, Remove PIN Unlock, Account Recovery, Single Organization, Disable Personal Export, Remove Credit Card Type, Activate Autofill, Default URI Match, Require Autofill Confirmation, Send Options |
| Enterprise | Everything in Business, plus: Require SSO, Failed Login Limit, Enforce Data Ownership, Firewall Rules, Block Domain Account Creation, Remove Send |
Compare plans on the pricing page. Policies are available on all Team, Business, and Enterprise subscription tiers.
Policy dependencies
Some policies depend on other policies being enabled first. Passwall prevents you from enabling a policy unless its prerequisites are met, and warns you if disabling a policy would break dependents.
| Policy | Requires |
|---|---|
| Require SSO | Single Organization |
| Session Timeout | Single Organization |
| Account Recovery | Single Organization |
| Default URI Match | Single Organization |
What this means in practice
Single Organization is the gateway policy for advanced controls. Once enabled, it prevents members from having accounts in multiple organizations, which makes session, SSO, and recovery policies enforceable. Plan to enable it early in your rollout if you need any of the dependent policies.
Recommended rollout framework
To reduce support tickets and user friction, roll out policies in phases:
- Phase 1 — Visibility
Before enforcing anything, review your current security posture. Check the Security dashboard for password health, 2FA adoption, and breach exposure. Communicate upcoming changes to your team.
- Phase 2 — Low-friction controls
Start with policies that improve security without disrupting workflows: Password Generator Requirements, Require Browser Extension, and Activate Autofill.
- Phase 3 — Identity controls
Enforce Require 2FA and Master Password Requirements. If using SSO, enable Single Organization first, then Require SSO. Give members a grace period to comply.
- Phase 4 — Data controls
Enable Disable Personal Export, Disable External Sharing, and Remove Credit Card Type for teams handling sensitive data. These are especially important for compliance-driven environments.
- Phase 5 — Network restrictions
Test Firewall Rules in "report" mode first. Once you've validated traffic patterns, switch to "deny". Enable Failed Login Limit as a final brute-force protection layer.
Communication checklist
- Announce each phase at least one week before enforcement.
- Provide clear instructions for 2FA setup and password changes.
- Define an emergency access path for admins in case of lockouts.
- Document exceptions for service accounts or automated workflows.
FAQ and troubleshooting
Why can't I enable a policy?
Two common reasons: (1) your current plan doesn't include this policy tier — check the plan tier badge on the policy card; (2) a prerequisite policy must be enabled first — check the dependency table above.
A policy toggle is greyed out. What does that mean?
Greyed-out toggles indicate the policy is not available on your current plan or a dependency is not met. Hover over the toggle for a tooltip explaining the requirement. Upgrade your plan or enable the prerequisite policy to unlock it.
We enabled a network policy and some users are locked out.
Verify the IP detection path and allowlisted ranges. If users are connecting through VPNs or dynamic IPs, ensure those ranges are included in the allowlist. Use "report" mode to identify all traffic patterns before switching to "deny". Keep at least one admin access path tested at all times.
Can members override organization policies?
No. Organization policies take precedence over personal settings. Members can set stricter personal requirements (e.g., a longer session timeout), but they cannot relax a policy below the organization minimum.
How quickly do policy changes take effect?
Most policies take effect immediately for new sessions. Existing sessions are affected at the next authentication event (sign-in, session refresh, or vault unlock). Server- enforced policies like Failed Login Limit and Firewall Rules apply instantly to all API requests.
Do policies help with SOC 2 / ISO 27001 / HIPAA compliance?
Yes. Policies provide the technical controls auditors look for: enforced 2FA, password complexity, session management, data export restrictions, and network access controls. The policy configuration serves as auditable evidence of your security controls.
Where can I get help with policy rollout?
Visit the Support Center for FAQs and guides, or contact our team for personalized rollout guidance. Enterprise plan customers get priority support with dedicated onboarding assistance.
Start enforcing security standards today
Begin with your highest-risk teams, enable baseline policies, and expand in controlled phases. Your security posture improves with every policy you enable.
Available policies may vary by plan tier and feature rollout. Always validate policy availability in your organization settings before communicating changes to your team.
This guide is maintained for admins, IT leads, and security teams who need practical policy guidance with minimal rollout friction.