Skip to content

Access & Identity

πŸšͺ Welcome to the Gateway

Most of the community cloud sits behind a shared identity system. This section explains how access works, where to create your account, what to expect after sign-in, and how to keep that account secure.

Looking to start right now?

Start with the Create Account guide for the full signup flow, then come back here if you want the broader overview.


πŸ—οΈ How the Identity System Works

Instead of managing separate usernames and passwords for every tool, this environment uses a centralized Single Sign-On (SSO) identity provider.

One Identity for Most Services

Once your account is created, the same identity can be reused across most supported applications in the ecosystem.

Role-Based Permissions

Signing in does not automatically unlock everything. Your account only sees the services and environments assigned to your role or membership.

Some Services May Use Separate Login

Most services use this identity system, but not all of them support it. A few apps may still require their own account or a separate login flow.

Need more access?

If you need access to additional services or higher permission levels, reach out to an admin.


🧭 Start Here

This is the fastest path from "I need an account" to "I am signed in and secure."

1. Understand the Boundaries

πŸ“˜ Read the Community Rules & Policies Before creating an account, review the acceptable use policies. Shared compute, storage, and community spaces only stay healthy when everyone understands the boundaries.

2. Create Your Account

πŸ“ Follow the Onboarding Guide The onboarding guide walks you through the self-service signup process: open the sign-in page, click Sign up, verify your email, create your profile, and log in successfully.

3. Secure the Account Immediately

πŸ›‘οΈ Configure Account Security Once your first login works, your next step is to enable Two-Factor Authentication (2FA), save recovery codes, review active sessions, and protect the account properly.

4. Ask for More Access If Needed

If you can sign in but do not see a service you expected, that usually means access has not been assigned to your account yet.

  • Some services are limited by role.
  • Some environments are reserved for specific groups.
  • Additional access can be granted by an admin when appropriate.

5. Get Help When Needed

πŸ†˜ Access Help & Support Use the support page if you lose your 2FA device, forget your password, hit an email verification problem, or run into errors when trying to access a specific app.


βœ… What to Expect

During Signup

  • You verify ownership of your email address before the account is created.
  • Your email address and username are permanent after account creation.
  • An expired verification email means you need to restart signup.

After Login

  • Most supported services can use the same identity.
  • Some services may still have their own separate login.
  • Your available apps depend on the access assigned to your account.

πŸ”’ A Note on Privacy & Telemetry

As a core philosophy of this self-hosted environment, your data remains private.

Unlike public cloud providers or commercial platforms, the authentication system is kept away from outside trackers and third-party telemetry.

  • We do not sell, share, or analyze your login data.
  • Chat logs, media history, and private files remain on-premise.
  • We rely on you to use strong passwords and 2FA to uphold your side of the security model.

Comments