/
Help Center
/ guides
/ Accessing Zitcha

accessing-zitcha - Articles Page

Accessing Zitcha

0 min read • Last updated 24 October 2024

This page describes how to access the Zitcha platform.


At Zitcha, ensuring a streamlined and secure access procedure is paramount.

Zitcha supports multiple methods of authentication. For more information on SSO, please see Single Sign On (SSO)

For organisations not integrated with SSO, the process of accessing our platform involves a straightforward registration and login sequence, designed to facilitate your interaction with our platform efficiently.

Registration Process

To begin using the Zitcha platform, access is initiated through an email invitation:

  1. Receive Invitation: An email invitation is sent to the prospective user's registered email address.
  2. Register Account: Upon receiving the invitation, click the provided link to be directed to the registration page.
  3. Set Up Credentials: You will be prompted to create a password and complete any necessary verification steps.
  4. Confirmation: Once registration is complete, you will receive a confirmation email, confirming that your account is set up and ready to use.

Login Process

Once registered, logging into the Zitcha platform is simple and secure:

  1. Navigate to Login: Visit the Zitcha platform login page.
  2. Enter Email Address: Type your registered email address into the Email Address field and click Continue.
  3. Password Entry: Input your password in the provided field and click Continue.

Security and Authentication

Each login attempt is authenticated to ensure that access is granted only to valid users. Zitcha's security protocols are designed to protect your personal and professional data while enabling seamless access to our platform.

Managing Your Account

Once a user is authenticated using your organisation identity provider, their Zitcha Roles & Teams will control access to products, resources and feature permissions.

For more information on Zitcha's Access Management controls, please refer to the below guide.

Identity & Access Management (IAM)

Give us feedback
Was this article useful?