| User Experience | Free | Pro |
|---|---|---|
Cross-Platform Access End-users can enjoy a seamless, consistent experience across mobile, tablet, and desktop devices, ensuring uninterrupted access anytime, anywhere.
| ✓ | ✓ |
Omnichannel Notifications End-users stay updated with real-time notifications through email, SMS, or in-app messages, ensuring that important events and activities are never missed.
| ✓ | ✓ |
Single Sign-On (SSO) End-users can access multiple applications with one login, eliminating password fatigue and boosting productivity.
| ✓ | ✓ |
SSO App Center End-users can easily access all their registered apps in one place, streamlining workflow and reducing login friction.
| ✓ | ✓ |
Accessibility Features End-users can enjoy an accessible experience with WCAG-compliant features, high-contrast modes, customizable text sizes, and keyboard navigation.
| ✓ | ✓ |
Brand Identity End-users experience a personalized environment with full brand customization, including logos, colors, and fonts, reinforcing brand identity.
| ✓ | ✓ |
| Authentication | Free | Pro |
|---|---|---|
Passwordless Login End-users can authenticate via devices like phones or computers, providing faster and more secure login experiences.
| ✓ | ✓ |
Multi-Factor Authentication (MFA) End-users complete multiple verification steps for critical operations, adding a layer of security to ensure safe and reliable access.
| ✓ | ✓ |
Email Codes End-users can log in securely without passwords by receiving email-based verification codes.
| ✓ | ✓ |
SMS Codes End-users can log in quickly and securely with SMS-based codes, improving ease of access.
| ✓ | ✓ |
Authenticator Apps End-users can streamline access with authenticator apps, generating login codes securely for a smooth experience.
| ✓ | ✓ |
Social Logins End-users can sign in with their existing social accounts (e.g., Google or Facebook), making the login process faster and more convenient.
| ✓ | ✓ |
Account Linking End-users can link multiple authentication methods to a single account, offering flexibility and ease.
| ✓ | ✓ |
Passwords End-users can create and manage secure passwords with recovery options, ensuring reliable access to their accounts.
| ✓ | ✓ |
| Account Onboarding | Free | Pro |
|---|---|---|
Self-Registration End-users can quickly get started by registering through a simple process, allowing immediate access to the platform.
| ✓ | ✓ |
Self-Registration via Identity Providers End-users can register using trusted identity providers like Google or Facebook, speeding up the onboarding process.
| ✓ | ✓ |
Admin-Invited Registration End-users can be securely invited by admins, ensuring a controlled onboarding experience with personalized access.
| ✓ | ✓ |
| Account Recovery | Free | Pro |
|---|---|---|
Self-Account Recovery End-users can recover their accounts independently, reducing downtime and ensuring smooth access restoration.
| ✓ | ✓ |
Admin-Assisted Recovery End-users can rely on admin-assisted recovery, providing secure access restoration when needed.
| ✓ | ✓ |
| Account Verification | Free | Pro |
|---|---|---|
Email Verification End-users can verify their accounts through email codes
| ✓ | ✓ |
Phone Verification End-users can verify their accounts using phone-based codes.
| ✓ | ✓ |
eKYC Verification End-users can undergo secure identity verification using external eKYC providers
| ✓ | ✓ |
In-Person Verification End-users can opt for in-person verification via an external process.
| ✓ | ✓ |
| Consent Management | Free | Pro |
|---|---|---|
Consent Granting End-users can easily grant or revoke consent for third-party access, ensuring full control over their personal data.
| ✓ | ✓ |
Consent History End-users can track and review their consent history, maintaining transparency in data usage.
| ✓ | ✓ |
Consent Revocation End-users can instantly revoke consent, ensuring that their data is not accessed without permission.
| ✓ | ✓ |
| Data Privacy | Free | Pro |
|---|---|---|
Data Access Requests End-users can request access to their personal data, offering full visibility into data usage.
| ✓ | ✓ |
Data Deletion Requests End-users can request the deletion of their personal data, giving them control over their information.
| ✓ | ✓ |
Data Export Requests End-users can export their personal data for record-keeping or to transfer it to other services.
| ✓ | ✓ |
Data Protection End-users can trust that their data is protected with strong encryption and security measures, ensuring privacy.
| ✓ | ✓ |
| Account Management | Free | Pro |
|---|---|---|
Profile Management End-users can easily update their profiles, including language preferences and contact details, for a personalized experience.
| ✓ | ✓ |
System Preferences & UI Customization End-users can customize the UI and system preferences, making the platform more accessible and comfortable.
| ✓ | ✓ |
Timezone Configuration End-users can configure their time zone to ensure accurate scheduling and reminders.
| ✓ | ✓ |
| Session Management | Free | Pro |
|---|---|---|
Active Sessions Monitoring End-users can monitor and manage their active sessions, improving security by tracking account access.
| ✓ | ✓ |
Multi-Device Access End-users can access their accounts on any device, ensuring a consistent and seamless experience across platforms.
| ✓ | ✓ |
Log Out from All Devices End-users can log out from all devices at once, preventing unauthorized access and maintaining control over their security.
| ✓ | ✓ |
| Enterprise B2B | Free | Pro |
|---|---|---|
Enterprise Logins Organizations can provide their end-users with secure, frictionless access by integrating with trusted identity providers like Microsoft Entra, Okta, and Google Workspace.
| ✓ | |
Provisioning via SCIM Organizations can streamline user onboarding by automatically synchronizing profiles, roles, and permissions with enterprise systems using the SCIM protocol.
| ✓ | |
Audit Logs 30 day Retention Organizations can access real-time audit logs, improving security monitoring and compliance for their end-users.
| ✓ | |
Audit Logs streaming Organizations can access real-time audit logs, improving security monitoring and compliance for their end-users.
| ✓ | |
OAuth Access Integration Organizations can securely integrate with your services via OAuth, ensuring seamless connections while maintaining security for their end-users.
| ✓ | |
Custom Authentication Policies Organizations can define and enforce tailored authentication policies to meet their specific security and compliance needs, enhancing their end-users' security.
| ✓ |
At TF Platform, safeguarding your users' data is our top priority. We employ advanced security measures, including
Your data remains secure with TF Platform as long as it resides on our servers. If you decide to move on, we make data exporting seamless. Simply navigate to the TF Platform Dashboard to access the export options. If you need help, check our comprehensive
Yes, once you exceed free tier users, you can easily transition to a paid plan tailored to your specific needs. Paid plans are scalable, starting from as few as 1,000 users and expanding to accommodate larger audiences. You'll also gain access to additional powerful features that enhance your platform capabilities.
TF Platform supports various deployment models designed to fit your organization's unique requirements:
We are proud to deliver over 99.99% uptime across regional regions. You can stay informed about the current and past status of our services by visiting our
Absolutely! TF Platform is dedicated to helping startups thrive. We offer a special plan that includes 100K monthly active users, Enterprise Identity Providers, advanced MFA & Password Protection, and SSO for TF Platform Dashboard free for a whole year. Additionally, you can apply for exclusive cloud credits. Check the requirements and apply here!
We believe in empowering organizations that are making a positive impact. Through our Social Impact Program, nonprofits can access discounted pricing and tailored services to support their missions. Find out more and request the Nonprofit and Social Good Benefits and Pricing Sheet here for complete criteria and validation steps.