Authentication and Access
Learn how authentication works in Sarah and how to keep your account secure.
Last updated: 2025-01-26
Authentication is the process of verifying your identity before allowing you to access Sarah. This guide explains how it works and how to keep your account secure.
Log In
Login Process
- Go to Sarah URL:
https://sarah.aror your custom domain - Enter your email: Email associated with your account
- Enter your password: Your password
- Click "Log In": System verifies your credentials
- Access granted: If credentials are correct, you access the system
Password Requirements
To maintain security, passwords must meet:
- Minimum length: Generally 8 characters (recommended: 12+)
- Complexity: Mix of uppercase, lowercase, numbers, and symbols
- Don't reuse: Don't use passwords from other accounts
- Unique: Each user must have their own password
Password Management
Change Password
To change your password:
- Log in to Sarah
- Go to your profile or account settings
- Look for "Change Password" or similar
- Enter current password
- Enter new password (twice to confirm)
- Save changes
Recommendation: Change your password periodically (every 3-6 months).
Recover Password
If you forgot your password:
- Go to login page
- Click "Forgot your password?" or similar
- Enter your email
- You'll receive an email with reset instructions
- Follow instructions in email
- Create a new password
Note: Recovery link has limited validity time.
Session Security
Session Duration
Sessions in Sarah:
- Have expiration time: After a period of inactivity, session closes
- Require re-authentication: For sensitive operations
- Can be closed manually: You can log out when you want
Log Out
To log out:
- Click your profile or user menu
- Select "Log Out"
- Confirm if requested
Important: Always log out when using shared computers.
Multiple Devices
You can log in from multiple devices:
- Computer: For administrative work
- Tablet: For mobile POS
- Phone: For quick queries
Note: Each device maintains its own session.
Two-Factor Authentication (2FA)
What is 2FA?
Two-factor authentication adds an additional security layer:
- Something you know: Your password
- Something you have: A code from your phone or app
Configure 2FA
If 2FA is available:
- Go to security settings
- Enable 2FA
- Scan QR code with your authentication app
- Enter code to confirm
- Save configuration
Recommended apps:
- Google Authenticator
- Authy
- Microsoft Authenticator
Use 2FA
When 2FA is enabled:
- Log in with email and password
- 2FA code requested: Open your authentication app
- Enter code: Enter 6-digit code
- Access granted: If code is correct, you access
Best Practices
Secure Passwords
- ✅ Use unique passwords: Don't reuse passwords
- ✅ Adequate length: Minimum 12 characters
- ✅ Complexity: Mix of uppercase, lowercase, numbers, and symbols
- ✅ Don't share: Never share your password
- ✅ Change regularly: Change passwords every 3-6 months
Session Management
- ✅ Log out: Always log out on shared computers
- ✅ Don't save passwords: Don't save passwords in shared browsers
- ✅ Use incognito mode: If necessary, use incognito mode on shared computers
- ✅ Monitor sessions: Regularly review active sessions
Two-Factor Authentication
- ✅ Enable 2FA: If available, enable it
- ✅ Protect your device: Secure your phone or 2FA device
- ✅ Backup codes: Save backup codes in a safe place
- ✅ Don't share codes: Never share 2FA codes
Common Problems
Cannot Log In
Possible causes:
- Incorrect password
- Incorrect email
- Disabled account
- Temporary problem
Solution:
- Verify email is correct
- Try to recover password
- Contact support if it persists
Forgot Password
Solution:
- Use "Forgot your password?" function
- Check your email (also spam)
- Follow email instructions
- Create a new password
Don't Receive Recovery Email
Possible causes:
- Incorrect email
- Email in spam
- Delay in sending
Solution:
- Verify email is correct
- Check spam folder
- Wait a few minutes
- Contact support if it persists
Session Closes Constantly
Possible causes:
- Inactivity time
- Multiple sessions
- Cookie problem
Solution:
- Ensure you're active
- Close other sessions
- Clear browser cookies
- Contact support if it persists
Additional Security
Suspicious Activity Detection
Sarah can detect:
- Logins from new locations
- Multiple failed attempts
- Unusual activities
If something suspicious is detected:
- Additional verification may be required
- Email notification may be sent
- Access may be temporarily blocked
Report Problems
If you suspect your account was compromised:
- Change your password immediately
- Close all active sessions
- Review recent activities
- Contact support immediately
Next Steps
- Roles and Permissions - Learn about roles
- Introduction to Security - Review security measures