#Signing In to the AiDial Portal
#Overview
The AiDial portal redirects you to the hosted identity provider for password entry, MFA challenge, and recovery-code entry. Your password and MFA codes are not handled directly by the portal.
After the identity provider returns you to the portal, AiDial resolves your role, tenant status, client, and project scope before normal access is granted.
#How to Sign In
- Navigate to the portal — Open your browser and go to the AiDial portal URL provided by your organisation.
- Enter your email and continue — The portal validates the email format and sends it to the identity provider as a login hint.
- Enter your credentials — Use the password and any provider-hosted recovery options associated with your AiDial account.
- Complete multi-factor authentication — If your role requires MFA (see Multi-Factor Authentication), the current session must be enrolled and the MFA challenge must be satisfied before normal portal access is granted.
- Finish first-time MFA setup if needed — On a first login for a mandatory-MFA role, the portal routes you into Settings so you can launch the hosted MFA setup flow. There is no general dashboard grace period before MFA is complete.
- You're signed in — After successful authentication, role/tenant bootstrap, and any required MFA setup, you will be redirected back to the portal dashboard or the page you originally requested.
Your session is maintained securely. You do not need to sign in again until your session expires or you sign out. See Session Security for details on session expiry and management.
#Lost Authenticator Access
If you lose access to your authenticator app, stay on the provider-hosted sign-in flow and use a provider-issued recovery code when the option is available. Recovery-code entry is handled by the identity provider, not by the portal.
If you do not have recovery codes, contact your organisation administrator first. If an administrator cannot help, contact AiDial support at help@aidial.com.au. AiDial Portal cannot bypass MFA, reveal one-time codes, or reset an authenticator from an unauthenticated browser session.
#How Sign-In Is Protected
Browser users sign in through the AiDial portal and should not send X-API-Key. API keys are for trusted direct server-side integrations.
Portal pages and actions check authentication, role permissions, and tenant/project scope. Navigation visibility is only a convenience and is not a security boundary. Out-of-role or out-of-scope routes are denied without revealing whether another tenant's resource exists.
#What You Can Access After Signing In
The portal sections available to you depend on your assigned role. See Roles & Permissions for a complete breakdown of what each role can access.
At a glance:
- Dashboard, Calls, Support, Settings, and Status — Available to client and partner portal roles, with tenant/project scoping enforced server-side.
- Billing — Available to
client_admin,client_manager, andpartner_adminonly. - Audit Log — Available to
client_admin,client_manager,aidial_admin, andaidial_operator. - Partner workspace —
Clients,Projects,Integrations, andPartner Teamare available topartner_adminandpartner_userwhen enabled for the organisation. - Team — Available to
client_adminand visible in read-only mode toclient_managerwhen enabled for the organisation. - Internal admin —
aidial_adminandaidial_operatorare redirected away from normal customer/partner portal routes and land in the internal admin surface, starting atTenants.
Not all portal sections may be available depending on your role and your organisation's current plan. See Roles & Permissions for details.
#Common Access Issues
If you are unable to access the portal or see an "Access Denied" page, here are the most common reasons:
#Wrong Role
Your account role does not have permission to access the page you requested. For recognised roles that are out of scope for a route, the portal displays a generic "not found" page to protect the privacy of other areas. If the portal cannot recognise your role at all, it shows an access-denied state. Contact your organisation's administrator or AiDial support to verify your role assignment.
#Tenant Suspended
Your organisation's account has been suspended or is otherwise not active. Portal access is only available for active tenant accounts. Contact your AiDial account manager or AiDial support for assistance.
#MFA Required
Your role requires multi-factor authentication, but you have not yet enrolled or completed the current MFA challenge. You will be directed to Settings to launch MFA setup or refresh your security status before accessing protected pages. See Multi-Factor Authentication for enrolment steps.
MFA is mandatory for partner_admin, aidial_admin, and aidial_operator. It is optional but recommended for client_admin, client_manager, client_staff, and partner_user.
#Session Validation Unavailable
If the portal cannot resolve your session context during sign-in, it shows an access-denied state for session validation. Try signing in again shortly. If the issue persists, contact AiDial support.
#Unable to Sign In
If you cannot sign in at all:
- Forgotten password — Use the password reset option on the hosted identity provider page if it is available, or contact your administrator.
- Lost authenticator access — Use a provider-issued recovery code on the hosted identity provider page. If you no longer have recovery codes, contact your organisation administrator or
help@aidial.com.au. - Account locked — After too many failed sign-in attempts, your account may be temporarily locked by the identity provider. Wait a few minutes and try again, or contact your administrator.
- Identity provider unavailable — In rare cases, the authentication service may be temporarily unavailable. Try again shortly. If the issue persists, contact AiDial support.
- Stale browser session — If an old session cookie is no longer valid, the portal should show the sign-in form again. Signing in again refreshes the session.