Guide to managing users, roles, workspace settings, SSO configuration, storage, backups, and audit logs in ContextQA.
Who is this for? Engineering Managers, IT Administrators, and VPs of Engineering configuring team access, authentication, and enterprise security controls.
This section covers everything a ContextQA workspace administrator needs to configure and maintain the platform: user management, authentication, storage, backups, and system auditing.
Inviting users, managing seats, and organization settings
Settings Navigation
All administration settings are accessible under the Settings menu:
Setting
Route
Purpose
User Management
/settings/user-managemant
Invite users, assign roles, deactivate accounts
Organization Settings
/settings/organization_setting
Org name, logo, default preferences
SSO / Authentication
/settings/auth
SAML 2.0 and OAuth SSO configuration
Storage
/settings/storage
File and artifact storage configuration
Backups
/settings/backups
Backup schedules and restore points
System Audit Logs
/settings/system-audits
Platform-wide activity audit trail
Provisioning Profiles
/settings/provisioning_profiles
iOS code signing certificates for mobile testing
Key Administrative Tasks
Inviting a new user
Go to Settings → User Management.
Click + Invite User.
Enter the user's email address and select their role.
Click Send Invitation.
The user receives an email with an activation link. They must activate within 7 days before the invitation expires.
Configuring SSO
ContextQA supports SAML 2.0 for enterprise SSO with providers such as Okta, Azure Active Directory, and Google Workspace.
Go to Settings → Authentication.
Enter your IdP metadata URL or upload the XML metadata file.
Configure attribute mappings (email, first name, last name).
Enable SSO and test with a single user before rolling out to the team.
See your IdP documentation for the ContextQA entity ID and ACS URL needed to complete the IdP-side configuration.
Reviewing audit logs
The system audit log records all significant platform events: user logins, permission changes, test case creation/deletion, integration configuration changes, and API key generation.
Enterprise-ready: SSO, RBAC, and centralized access management.Book an Enterprise Demo → — Get a walkthrough of enterprise controls, SSO setup, and compliance features for your organization.