General Questions
What is changing with Intellistack Streamline?
On November 25, 2025, we're upgrading Streamline's login and authentication system to a new enterprise-grade authentication provider. This upgrade brings enhanced security features, improved user management capabilities, and sets the foundation for exciting future capabilities like advanced multi-tenant support.
When is this upgrade happening?
The upgrade will take place on November 25, 2025, at 4:00 AM ET (9:00 AM GMT).
Why is Intellistack making this change?
This upgrade enables us to provide you with enterprise-grade security features, more granular admin controls, and lays the groundwork for advanced capabilities that many of you have requested. The new system offers:
Enhanced security with adaptive multi-factor authentication
Improved admin controls for user and access management
Step-by-step SSO configuration with built-in testing
Foundation for future multi-tenant architecture
Separate credential management for Streamline accounts
Will my workflows and data be affected?
No. Your workflow configurations, data, and all existing Streamline functionality will remain unchanged. This upgrade only affects the authentication system - how you log in and manage user access.
Login and Authentication
Do I need to create a new account?
No. Your existing account will automatically transition to the new system. You'll use the same email address to log in.
Will my password change?
Your existing password will be maintained during the migration. You can continue using your current password, or you can reset it at any time through the new login interface.
What is the new login URL?
The login URL will be: https://us.streamline.intellistack.ai/login
Your existing login URLs will automatically redirect to the new login page.
What does the new login experience look like?
You'll notice a refreshed login interface that provides a cleaner, more modern experience. The core login process remains simple - enter your email and password to access Streamline.
Multi-Factor Authentication (MFA)
Will my MFA method be migrated to the new system?
No. Your current two-factor authentication (2FA) method will not be migrated. By default, email 2FA will be enabled for your account. If you prefer a stronger second factor, you will need to set up 2FA using an authenticator app, as SMS 2FA will not be supported.
Is MFA required?
Yes. All users will have email-based MFA enabled for enhanced security. The system uses adaptive MFA, which means you won't be required to authenticate at every login - only when the system detects unusual activity or changes in your login pattern.
What type of MFA will I use?
By default, all users will have email-based two-factor authentication (2FA) enabled unless already using 2FA with an authentication app. You'll receive a verification code via email when MFA is required.
You also have the option to switch to Time-Based One-Time Password (TOTP) authentication using apps like Google Authenticator, Authy, or similar authenticator apps. This option can be configured in your user profile settings after the migration.
Can I require that the users on my org use TOTP authentication using an authentication app?
If you need to require the use of TOTP auth via authentication app, please get in touch with our Support team who can enable this on your account. A self-serve option is coming soon.
I was using SMS 2FA - what happens to that?
SMS-based two-factor authentication is not supported in the new system. If you were previously using SMS 2FA, you'll automatically be set up with email-based 2FA after the migration. You'll receive verification codes via email when MFA is required.
If you prefer stronger authentication than email-based 2FA, you can switch to TOTP (Time-Based One-Time Password) authentication using apps like Google Authenticator, Authy, or similar authenticator apps. You can configure this option in your user profile settings after the migration.
How does adaptive MFA work?
The system monitors signals from your device and browser information, including:
Trusted device recognition
Location data
Unusual login patterns
When you log in from your regular device and location, you likely won't be prompted for MFA. However, if the system detects something unusual (like a new device, different location, or suspicious activity), it will require MFA verification for added security.
Can I manage my MFA personal settings?
Yes. After the migration, you can access your MFA settings in your user profile to:
Switch between email-based and TOTP-based authentication
Configure authenticator apps for TOTP
Single Sign-On (SSO)
I use SSO - what do I need to do?
If your organization uses SSO, your admin will need to reconfigure your SSO connection after November 25. This is a one-time setup that takes approximately 15-30 minutes.
Will my users be locked out during SSO reconfiguration?
No. Users can continue logging in with their email and password while your admin reconfigures SSO. Once SSO is set up and tested, you can enable it for your users.
What SSO providers are supported?
The new system supports SSO integration with the following providers:
Google Workspace
Okta
Azure Entra ID (formerly Azure AD)
Microsoft AD FS
PingFederate
PingOne
OneLogin
Keycloak
JumpCloud
Auth0
ClassLink
CyberArk
Duo
LastPass
miniOrange
Salesforce
You can also configure SSO directly using custom SAML 2.0 or OIDC settings for other providers.
What's new with SSO setup?
The new SSO setup experience includes:
Step-by-step, provider-specific configuration guides
Built-in testing that verifies your SSO configuration before you enable it
The ability to see exactly what user profile and role information will be passed from your identity provider
Clearer error messages and troubleshooting guidance
API and Personal Access Tokens
I use the Streamline API - what do I need to do?
If you use Personal Access Tokens (PATs) to authenticate with the Streamline API, you'll need to generate new keys after the migration on November 25. Your existing tokens will stop working after the migration.
How do I generate new Personal Access Keys?
After the migration, you can generate Personal Access Keys directly from your user profile in Streamline. The API endpoints and functionality remain unchanged - you'll only need to update your tokens.
Will there be any API downtime?
There may be a brief period during and immediately after the migration where you'll need to regenerate your tokens. We recommend being prepared to regenerate tokens on November 25 to minimize any disruption.
Can all users create Personal Access Tokens?
By default, all users can create their own Personal Access Tokens. However, admins have the ability to restrict PAT creation to admins only. If this restriction is enabled, existing tokens will continue to work, but non-admin users won't be able to create new tokens.
Admin and Organization Management
What new admin capabilities will I have?
After the migration, admins will have access to enhanced security and user management features:
Organization-wide Personal Access Token management
Ability to control whether non-admins can create API tokens
Can I manage session timeouts?
Not immediately at launch. Admins will be able to configure session timeout policies for their organization soon after the initial migration. Until then, please contact Support if you would like to make changes.
What is the default session timeout?
4 hours. If you would like to have this changed for your organization, please contact our Support team.
How do I manage users in the new system?
User management will still be handled through your admin interface in Streamline, with enhanced visibility into Personal Access Key access.
Account Settings and Profile
Where can I update my profile information?
After the migration, you'll find updated profile settings in your Streamline account where you can:
Reset your password
Configure your MFA preferences
Generate and manage Personal Access Tokens
Can I reset my password?
Yes. Password reset functionality is available through the new login interface and within your user profile settings.
Support and Resources
Where can I get help if I have issues?
Our support team will be available to assist you throughout the migration and beyond. You can:
Submit a support request at: https://help.intellistack.com/hc/en-us/requests/new
Review our updated help documentation at: https://help.intellistack.com/hc/en-us
Contact your Customer Success Manager if you have an enterprise account
When will support be available during the migration?
We'll have enhanced support coverage from November 21-27, 2025, to ensure any questions or issues are addressed quickly.
Will there be documentation for the new features?
Yes. Complete documentation for all new features, including step-by-step guides for SSO configuration, MFA setup, and Personal Access Key generation, will be available in our help center before the migration.
What if something goes wrong during the migration?
Our engineering team will be monitoring the migration closely and is prepared to respond quickly to any issues. We have comprehensive rollback procedures in place if needed, though we expect a smooth transition based on our thorough testing.
Troubleshooting
I can't log in after the migration - what should I do?
If you're having trouble logging in:
Clear your browser cookies and cache
Try using the password reset function
Check if you need to complete MFA verification
Contact support for assistance
I can log in but I’m not seeing my projects or something else looks off - what should I do?
Clear your browser cookies and cache. This should resolve the issue. If not, please contact support for further assistance.
I received an MFA code but it's not working - what should I do?
If you're using email-based MFA:
Request a new code if the previous one has expired
Ensure you're entering the code exactly as it appears
If you're using TOTP (authenticator app):
Verify your device's time is set correctly
Try generating a new code from your authenticator app
My SSO isn't working after reconfiguration - what should I check?
The new SSO setup includes built-in testing. If you're experiencing issues:
Use the test function in the SSO configuration to see detailed error messages
Verify your identity provider configuration matches the setup guide
Check that user attribute mappings are correct
Contact support with any error messages you receive
Questions Not Answered Here?
If you have questions that aren't addressed in this FAQ, please don't hesitate to reach out to our support team. We're here to make this transition as smooth as possible for you and your organization.
Visit our help center at https://help.intellistack.com/hc/en-us or submit a support request for personalized assistance.
Comments
0 comments
Article is closed for comments.