Te Apuesto

Secure Customer Portal Login

Welcome to your secure access point for mission-critical work. The Customer portal login is optimized for reliability and privacy, giving end users, administrators, and IT leaders a trusted path to their workspace. Enterprise-grade encryption, role-based permissions, and clear recovery options minimize friction while protecting sensitive data across your organization.

Choose your sign-in method

Select the authentication option that aligns with your organization’s identity policy. The Customer portal login supports federated credentials and standard email access to streamline entry without compromising control.

  • Single Sign-On (SSO): Sign in with Okta, Azure AD, Google Workspace, or any SAML 2.0–compatible IdP.
  • Work Email + Password: Use your verified business credentials when SSO is not enabled.
  • Organization URL: Access your tenant-specific sign-in page to route through the correct IdP.
  • SCIM-Managed Users: Provisioned accounts sync automatically from your directory.
  • Administrators: Use your admin role to manage seats, groups, and billing from the same entry point.

Multi-factor authentication (MFA)

Strengthen session integrity with MFA on every critical action or at each new device. Options are configurable by policy and enforced consistently for all roles through the Customer portal login.

  • Authenticator App (TOTP): Time-based one-time codes from your chosen app.
  • Push Approval: Approve a secure prompt on your registered device.
  • Security Keys: FIDO2/WebAuthn hardware keys for phishing-resistant access.
  • Backup Codes: Single-use recovery codes for verified users, stored securely offline.

Account recovery

If you can’t sign in, start with self-service recovery. Administrators and IT can also assist through delegated controls without exposing private data.

  • Forgot Password: Receive a time-limited reset link to your verified email.
  • Reset MFA: Regain access via admin-approved reset or identity verification.
  • Unlock Account: Automatic unlock after cooldown or immediate unlock by an authorized admin.
  • Resend Verification: Trigger a new verification message if activation is pending.

Troubleshooting and support

For incident visibility and self-help, use the following resources directly from the sign-in screen.

  • Help Center: Step-by-step guides for sign-in, MFA, and recovery flows.
  • Contact Support: Priority assistance for admins and enterprise teams.
  • Status Page: View service availability, uptime metrics, and maintenance windows.

Security and compliance you can trust

Every Customer portal login is protected by encryption in transit and at rest, session isolation, device recognition, and automatic logout after inactivity. Security controls include least-privilege access, granular role-based permissions, IP allowlists, audit logs, and admin-enforced policies. Our program aligns with SOC 2 Type II and ISO 27001 standards, with GDPR-compliant processing, data minimization, and regional data residency options as contracted. We regularly assess controls, monitor threats, and maintain change management practices to safeguard your operations.

Legal and preferences

By proceeding, you agree to the Terms of Service and acknowledge the Privacy Policy, including cookies used for essential session security. Language and region settings can be adjusted at sign-in to meet localization and data handling needs. Partners and contractors sign in with scoped roles, ensuring the Customer portal login grants only the permissions assigned by your organization.

Need access?

If you do not have credentials, request an invitation from your administrator. Self-registration may be disabled based on policy; where enabled, follow the guided enrollment to complete identity verification and MFA setup. Once approved, use the Customer portal login to enter your workspace with confidence.



Enterprise SSO with SAML/OIDC and directory sync, Enforced MFA with support for FIDO2/WebAuthn keys, Granular role-based permissions and audit logs, Compliance-aligned controls: SOC 2 Type II, ISO 27001, GDPR, Session security with device recognition and auto timeouts, 24/7 status visibility and priority enterprise support

#SSO, #MFA, #SOC2, #ISO27001, #GDPR, #ZeroTrust