Access & Security
Protect your Mixpanel organization with enterprise-grade security features including Single Sign-On, Two-Factor Authentication, and domain claiming.Single Sign-On (SSO)
Users on an Enterprise plan can enable Single Sign-On for authentication. See our pricing page for more details.
Access SSO Settings
You will need to be in the Organization Owner or Admin role to access the SSO settings. To access SSO settings:- Navigate to Organization Settings (gear icon at top-right)
- Click on the Access Security tab
Claim a Domain
Claiming a domain will add security to an SSO implementation by allowing only members with a claimed domain in their email address to access Mixpanel. SSO only works on domains that are claimed.Generate Verification Key by Claiming Domain
Generate Verification Key by Claiming Domain
To claim a domain:
- Click Access Security in your Organization Settings
- Click Domain Claiming in the Access Security menu
- Click Add a Domain
- You will be prompted to enter your Mixpanel password
- Enter the domain you wish to claim in the pop-up modal
- Click Submit Claim
Check Verification Status
Check Verification Status
It may take up to 24 hours for Mixpanel to verify ownership after you claim a domain.The claimed domain are listed in the Domain Claiming menu. It will appear as pending until it is successfully verified, then indicate as verified after Mixpanel verifies the domain.
Add Verification Token to your DNS
Add Verification Token to your DNS
For Mixpanel to verify that you own the domain claimed, Mixpanel must detect the verification token in a TXT record in your domain’s DNS.The verification token is available in the Domain Claiming menu after you claim a domain. Use the verification token in the TXT record that you add to your domain’s DNS record.Add
mixpanel-domain-verify=<your-token> as the TXT record.Set Up Your Identity Provider (IDP)
You must configure your Identity Provider to connect to Mixpanel in order to use SSO if you are not using custom built SSO.Okta
Okta
Set up SSO with Okta using the “Mixpanel” app within the OIN or by configuring a custom app in Okta. See the Okta configuration instructions.
OneLogin
OneLogin
OneLogin only requires that you get the Postback URL. The “Mixpanel” application is in the OneLogin application store and supports auto-provisioning. You will just need to copy a SCIM token from Mixpanel into the provisioning token box in the OneLogin app.
G-Suite
G-Suite
Google has an official integration with Mixpanel with instructions here. Unfortunately, we do not have an auto-provisioning integration with G-Suite. You will need to rely on Just In Time Provisioning.
Azure
Azure
See the Azure configuration instructions. Azure also has an auto-provisioning integration with Mixpanel which you can find more info here.
Other IDPs
Other IDPs
It is possible to set up Mixpanel SSO with IDPs not listed above. Contact support for further assistance in such cases.
Postback URL
You likely will need to provide your IDP with a postback URL. The postback URL is accessible from the Access Security menu. To obtain your postback URL:- Navigate to Access Security in your Organization Settings
- Toggle on the Single Sign-On button
- Copy the postback URL displayed
SAML Certificate
This needs to be a .cert or .pem file for a valid X509 certificate.Require Users to Log In Using SSO
Optionally toggle on Require Single Sign-On to require your users to log in using SSO and to prevent your users from logging in using a username and password.- Organization Owners and Admins will still be able to log in using username and password in the case that SSO is not set up correctly
- External users (with an email of an unclaimed domain) who were invited to projects will still be able to log in using username and password
IDP Managed Access
This feature determines whether you are using your IDP to manage which users should be allowed in the organization or whether you are using the IDP purely as an authentication method and want to leave user management within Mixpanel. If you enable this feature:- All users of your verified claimed domain(s) who log into Mixpanel will be prompted to use SSO, whether they are in your organization or not
- If they successfully log in through your SSO setup, they will be automatically added to the organization with no permissions except those granted to all users (JIT provisioning)
- It will also redirect anyone signing up for a Mixpanel account with your claimed domain or anyone requesting access to a project in your organization to log in via SSO first
We recommend enabling IDP Managed Access for most customers.
- Go to Access Security tab in Organization Settings
- Toggle on IDP Managed Access at the bottom
- The toggle is purple when enabled
Just in Time Provisioning
Just in Time (JIT) provisioning using SAML will let users sign in automatically upon the initial login event. This removes the need for organization admin to invite individual users to an Organization. This is part of the IDP Managed Access feature. To use JIT provisioning:- Go to Access Security
- Toggle on the IDP Managed Access toggle (purple when enabled)
firstName and lastName profile attributes provided via SAML at login time. These users will also have no roles to start off except those given to all users in your organization.
To give these provisioned users default access to projects, invite All Users in the Organization to the project.
SCIM
Only accounts with an Enterprise plan have access to SCIM.
https://mixpanel.com/api/app/scim/v2 which you can hit using the SCIM token as an Authentication Bearer token.
Example: A GET call on https://mixpanel.com/api/app/scim/v2/Users using the SCIM token will get you a list of all users in your organization.
The SCIM endpoint affects only users whose email has a domain in the list of your verified claimed domains.
- Okta
- OneLogin
- Azure
We recommend enabling IDP Managed Access when using SCIM; otherwise, your IDP and Mixpanel can get out of sync.
Remove SSO Configuration
If you need to remove all of your SSO configuration, you can do so with the “Remove SSO Configuration” button. This option is available if you had previously configured SSO and then disabled SSO. This will clear the settings and SAML certificate, as well as entries that facilitate the SSO process.Two-Factor Authentication (2FA)
Two-factor authentication (2FA) is a security process that requires users to provide two different authentication factors, such as passwords or tokens, to verify their identity.Enable 2FA for Your Organization
If you are an organization admin, you can enable two-factor authentication:- In your “Organization Settings”, select Access Security
- In “Two Factor Authentication”, click the toggle to enable (purple when enabled) or disable (gray)
- The “Verify Mixpanel password” box will appear
- Enter your password and click Confirm to finalize changes
If you do not have a password because you use Magic Link or Google Sign In, please go to your personal settings to set up your password.
Setting Up Your 2FA Method
Once two-factor authentication has been enabled for your organization, an individual member of your organization can set up two-factor authentication via the methods below.Setup via Second Login
Setup via Second Login
On their second login, Mixpanel Users will be prompted to set up two-factor authentication via an authentication app.Authentication App:
- Select the authentication app option and ensure you have your preferred authentication app downloaded. We recommend using apps such as Google Authenticator, Authy and Microsoft Authenticator
- Scan the QR code via your Authentication App to complete the setup
- If you are unable to scan the QR code, click on “Can’t scan QR code?” for a two-factor secret to set up your authentication app manually
- Before you log in to Mixpanel, download or copy your recovery codes. These are essential for you to log in if you happen to lose your phone
Setup via Personal Settings Page
Setup via Personal Settings Page
An individual user can also set up their two-factor authentication via their personal settings.
- Go to the settings icon > personal settings > your profile
- Click on “Set Up Method”
- You will be asked to log out in order to set up two-factor authentication
- Log in to Mixpanel and follow the setup process
Changing Your 2FA Method
An individual user can switch between different authentication apps for their two-factor authentication method via their personal setting (e.g., Authy to Google Authenticator). To switch methods:- Go to settings cog > personal settings > your profile
- Click “Change Method”
- To change your method, log out and log back in to Mixpanel to start the setup process for your new authentication method
Login via Backup Methods
If you are unable to log in due to two-factor authentication because you lost your phone, we have backup methods you can use.Login via Recovery Codes (Authentication App)
Login via Recovery Codes (Authentication App)
If an authentication app is your preferred method of authentication, you can login via your saved recovery codes if you don’t have access to your phone.
- Click on “Need help? Use a recovery code to sign in”
- Enter your recovery code and click “Login”
If you use all your recovery codes, you will be asked to reset your two-factor authentication method on your next login.
Resetting 2FA for Users
As an organization admin, you can reset two-factor authentication (2FA) for users within your organization.- Navigate to the Access Security section within your “Organization Settings”
- Click on the 2FA tab
- Select the users whose 2FA needs to be reset
- Click Reset Two-Factor Authorization
Login Methods
Mixpanel supports various login methods to provide flexibility and security for accessing your account.Available Login Methods
Email and Password
Email and Password
The traditional method of logging in with your email address and password. Users can create a password when they first sign up or can reset their password if forgotten.
Magic Link
Magic Link
Magic Link allows you to log in to Mixpanel without a password. Simply enter your email address, and Mixpanel will send you a one-time login link via email.Benefits:
- No need to remember passwords
- Secure authentication
- Quick access to your account
Google Sign-In
Google Sign-In
Sign in to Mixpanel using your existing Google account. This provides a seamless login experience if you’re already signed in to Google.
Single Sign-On (SSO)
Single Sign-On (SSO)
For Enterprise customers, SSO allows you to use your organization’s identity provider to authenticate users. This provides centralized access control and enhanced security.
Security Best Practices
Password Requirements
Password Requirements
When creating a password for Mixpanel:
- Minimum length requirements
- Combination of uppercase and lowercase letters
- Include numbers and special characters
- Avoid common passwords
- Don’t reuse passwords from other services
Session Management
Session Management
Mixpanel sessions are managed securely:
- Sessions expire after a period of inactivity
- You can log out from all devices
- SSO sessions are managed by your identity provider
- 2FA is required at each login when enabled
Access Control Best Practices
Principle of Least Privilege
Grant users the minimum level of access required to perform their job functions:- Consumers for users who only need to view reports
- Analysts for users who need to create and save reports
- Admins for users who need to manage settings and users
- Owners for users who need full control
Regular Access Audits
Perform regular audits of user access:- Review user list monthly
- Remove users who have left the organization
- Adjust permissions as roles change
- Document access decisions
Service Accounts
For API access and integrations:- Create service accounts instead of using personal accounts
- Grant service accounts only the permissions they need
- Rotate service account credentials regularly
- Document what each service account is used for
Data Classification
Use data classification features to protect sensitive information:- Mark sensitive properties as classified
- Grant classified data access only to users who need it
- Use Data Views to segment access to different data sets
- Regularly review who has access to classified data
Compliance and Auditing
Audit Logs
Mixpanel maintains audit logs for security-relevant events:- User login and logout events
- Permission changes
- Project modifications
- Data exports
Contact your account manager for information about accessing detailed audit logs for your organization.
Compliance Certifications
Mixpanel maintains various security and compliance certifications:- SOC 2 Type II
- GDPR compliance
- CCPA compliance
- ISO 27001