Enterprise polices allow Enterprise organizations to enforce security rules for all users, for example mandating use of two-step login.
Enterprise policies can be set by organization admins or owners.
We recommend setting enterprise policies prior to inviting users to your organization. Some policies will remove non-compliant users when turned on, and some are not retroactively enforceable.
Policies can be set in your organization by opening the the Settings tab and selecting Policies from the left menu:
Turning on the Require two-step login policy will require non-owner/non-admin users to use any two-step login method to access their vaults. If you are using an SSO or identity provider's 2FA functionality, you don't need to enable this policy.
Users in the organization who do not have two-step login turned on will be removed from the organization when you activate this policy.
Users who are removed as a result of this policy will be notified via email, and must be re-invited to the organization.
Existing users will not be able to accept the invitation until two-step login is turned on for their vault.
New users will be automatically setup with email-based two-step login, but can change this at any time.
Turning on the Master password requirements policy will enforce a configurable set of minimum requirements for users' master password strength. Organizations can enforce:
Minimum master password complexity
Minimum master password length
Types of characters required
Password complexity is calculated on a scale from 0 (weak) to 4 (strong). Bitwarden calculates password complexity using the zxcvbn library.
Existing non-compliant users will not have their master passwords changed when this policy is turned on, nor will they be removed from the organization. The next time this group of users changes their master password, this policy will be enforced.
Turning on the Master password reset policy will allow owners and admins to use password reset to reset the master password of enrolled users. By default, users will need to self-enroll in password reset, however the automatic enrollment option can be used to force automatic enrollment of invited users.
Turning on the automatic enrollment option will automatically enroll new users in password reset when their invitation to the organization is accepted and prevent them from withdrawing.
Users already in the organization will not be retroactively enrolled in password reset, and will be required to self-enroll.
Turning on the Password generator policy will enforce a configurable set of minimum requirements for any user-generated passwords. Organizations can enforce:
Password, passphrase, or user preference
Minimum password length
Minimum number (0-9) count
Minimum special character (!@#$%^&*) count
Types of characters required
Minimum number of words
Whether to capitalize
Whether to include numbers
Existing non-compliant passwords will not be changed when this policy is turned on, nor will the items be removed from the organization. When changing or generating a password after this policy is turn on, configured policy rules will be enforced.
A banner is displayed to users on the password generator screen to indicate that a policy is affecting their generator settings.
Turning on the Single organization policy will restrict non-owner/non-admin members of your organization from being able to join other organizations, or from creating other organizations.
Users in the organization who are members of multiple organizations will be removed from your organization when you turn on this policy.
Users who are removed as a result of this policy will be notified via email, and must be re-invited to the organization. Users will not be able to be accept the invitation to the organization until they have removed themselves from all other organizations.
Turning on the Require single sign-on authentication policy will require non-owner/non-admin users to log in with SSO. For more information, see Using Login with SSO.
The Single organization policy must be on before activating this policy.
As a result, you must turn off the Require single sign-on authentication policy before you can turn off the Single organization policy.
Turning on the Remove individual vault policy will require non-owner/non-admin users to save vault Items to an organization by preventing ownership of vault items for organization members.
A banner is displayed to users on the Add Item screen indicating that a policy is affecting their ownership options.
Vault items that were created prior to the implementation of this policy or prior to joining the organization will remain in the user's individual vault.
Turning on the Remove Send policy will prevent non-owner/non-admin users from creating or editing a Send using Bitwarden Send. Users subject to this policy will still be able to delete existing Sends that have not yet reached their deletion date.
A banner is displayed to users in the Send view and on opening any existing Send to indicate that a policy is restricting them to only deleting Sends.
Turning on the Send options policy will allow owners and admins to specify options for creating and editing Sends. Owners and admins are exempt from this policy's enforcement. Options include:
|Do not allow users to hide their email address||Turning on this option removes the hide email option, meaning that all received Sends will include whom they are sent from.|
Turning on the Vault timeout policy will implement a maximum vault timeout duration for all members of your organization except owners. This policy applies the timeout restriction to all client applications (mobile, desktop, browser extension, and more).
A banner is displayed to users during vault timeout configuration indicating that a policy is affecting their options.
The Single organization policy must be enabled before activating this policy.
As a result, you must turn off the Vault timeout policy before you can turn off the Single organization policy.
Turning on the Remove individual vault export policy will prohibit non-owner/non-admin members of your organization from exporting their individual vault data.
In the web vault and CLI, a message is displayed to users indicating that a policy is affecting their options. In other clients, the option will simply be disabled.