Skip to main content

Privacy and Security
Privacy and Security
  • This is the place to discuss everything from privacy to access control to data security and any other relevant topics of your choice.
  • Asks questions, give advice, comment on posts...
  • Learn all about Privacy and Security in Pipedrive.
  • Click Follow to always stay posted ↗️


1 question
30 posts

Sign up for free today or log in now to follow this topic, join the discussion, and always stay updated.

🎥 How to customize your notifications, follow topics, and join channels in the Community.

Problem: Android App & SAML SSO

When trying to log onto the Pipedrive app with Microsoft SAML SSO, instead of being logged into the app, a Pipedrive browser window opens inside the app.

This isn't useful. What am I missing about SAML SSO logins??


#SAML #SSO #Android

email verification masquerading as 2FA

The email verification masquerading as 2FA is very inconvenient and relies on the customer to have access to their Pipedrive associated email account on the same device on which they are logging into Pipedrive. Competing applications are smarter and use Authenticator apps or push notifications. When will this be changed as it interrupts workflow and restricts access for those with valid credentials?

Guys does anyone know why when I embed a link of a dashboard in Notion it is in ukrainian?

Secure your account with two-factor authentication

Data breaches can cost businesses millions in lost revenue and damage to reputation.

According to Verizon, over 80% of data breaches are due to poor passwords

By enabling our two-factor authentication feature, you add an extra layer of security to your Pipedrive data with an additional step in the login process.

If the feature is enabled and you attempt to log in to your Pipedrive account, we’ll send you an email to the email address you use to log in, with a verification link that provides access to your account.

We'll also let you know where in the world the login request has come from to help prevent unwanted parties or individuals from gaining access to your valuable assets and information.

Read our blog to find out how you can set-up two-factor authentication.