Skip to main content

Configuring your Celonis Platform security features

Your security features allow you to control who or what can access your Celonis Platform and what authentication you require from them.

As an Celonis Platform admin, you can configure the following security features:

Identity and access management

Secure your environment by defining how users authenticate and how their accounts are managed. Whether you use the native Celonis ID system or integrate with your organization's existing Identity Provider (IdP) via SSO, these settings ensure that only authorized personnel can access your data.

Environment and network security

Beyond individual user access, you can implement broader safeguards to protect your entire platform instance. These tools allow you to harden your security posture by restricting access to known corporate networks, managing session persistence, and ensuring team-level privacy.

Communication and enrollment

Configure how new users join your team and how the platform represents your organization in outbound communications. These settings help balance ease of onboarding with administrative control, while maintaining a professional look for automated system emails.

Security recommendations

Your team security and user provisioning settings may vary depending on your team size. Before setting up your team, we therefore recommend that you choose a coupling approach and relevant settings.

For our security recommendations, see: Security recommendations