Use Your Identity. Access Files Everywhere.

MyWorkDrive works with the identity infrastructure you already trust. Active Directory or Microsoft Entra ID. Users sign in the way they already sign in. MFA and access policies stay where you manage them. No password sync. No duplicate accounts. No new identity system to learn.

Choose Your Identity Source

MyWorkDrive supports two identity modes, chosen at setup. Both deliver the same user experience across web, mapped drive, and mobile.

Active Directory Mode

For organizations with domain infrastructure

Your domain controllers authenticate users exactly as they do today. MyWorkDrive never sees or stores passwords.

What stays the same

Existing AD groups and OUs
Windows-integrated authentication
Established group policies
Current audit trails

What you can add

SAML SSO for browser sign-in
MFA at your identity provider
Typical fit: Organizations with on-premises domain controllers

Microsoft Entra ID Mode

For cloud-first organizations

Users sign in with Microsoft credentials using native Entra ID authentication. No SAML configuration needed.

What stays the same

Entra ID as your identity source
Existing MFA requirements

What you gain

Conditional Access applies to sign-in
Outbound-only connectivity option
No on-premises domain dependency
Typical fit: Organizations using Microsoft 365 or moving away from on-premises

Add SSO With Your Existing Provider

For Active Directory mode, MyWorkDrive supports SAML 2.0 integration with the providers you already use.

Microsoft Entra ID
Standard SAML 2.0 integration
Supports Conditional Access
Okta
Listed in Okta Catalog
Supports Single Logout
OneLogin
Enterprise app available
Simple metadata exchange
Duo Security
Native Duo MFA integration
Universal Prompt compatible
ADFS
Full SAML 2.0 integration
On-premises control
Other SAML Providers
Ping, Shibboleth, and more
Standard metadata exchange

Authentication Belongs to Your Identity Provider

MyWorkDrive defers authentication to your identity provider. MFA and access policies stay where you already manage them.

One place to configure

Set MFA in Okta, Entra ID, Duo, or ADFS. Users experience those requirements across all MyWorkDrive clients.

Conditional Access honored

Your Entra ID policies apply to MyWorkDrive sign-in.

Correlated audit records

Authentication logs in your IdP. File access logs in MyWorkDrive. Two streams, one identity.

Guest Access Made Easy

Partners and contractors need file access. MyWorkDrive integrates with Microsoft Entra B2B so external users authenticate with their own identity, governed by your policies.

01

Invite via
Entra ID

Guests receive an invitation

02

Authenticate with
their identity

Microsoft, Google, or federated

03

Your policies
apply

Including MFA and access reviews

04

Revocation
is immediate

Remove in Entra ID; access ends

What admins control

Which shares allow guests
MFA requirements
Who can invite
Expiration workflows

What guests experience

Email invitation
Provisioned shares only
Familiar sign-in
No VPN needed

Layer Policy on Top of Permissions

Your existing permissions remain authoritative. MyWorkDrive adds a policy layer that can restrict further.

Pre share

Client types, Office Online, public links, DLP restrictions

Per user / Per group

Mapped drive access, web-only restrictions, download blocking

Layer, Controls, and Examples table

NOTE: MyWorkDrive can restrict capabilities. It cannot grant access you have not already granted.

Control Which Devices Connect

Device approval gives IT visibility into what's connecting and the ability to allowlist devices for mapped drive and mobile clients.

01

Monitor mode

See all devices, build your allowlist

02

Approval required

New devices request access

03

Per-client rules

Different policies for mapped drive vs. mobile

One Identity, No Sprawl

MyWorkDrive doesn't store passwords. No user database to sync, no credential store to secure.

For users

Same sign-in as everything else

For IT

No password resets, no sync jobs

For security

Disable an account; access stops. One lifecycle. Correlated audit trails.

Runs On-Premises, With Optional Cloud Services

Active Directory mode can operate entirely within your network for isolated or classified environments.

No External Connectivity Needed

AD domain controllers
Windows Server
Network access to storage
On-premises editing (ONLYOFFICE)

External Connectivity for

License validation
Cloud Web Connector
Office on the web
Cloud-hosted SAML providers
Note: For air-gapped deployments, contact us about license validation options.

Test With Your Identity Provider

Start a free 14-day trial. Configure SSO with your existing Entra ID, Okta, or ADFS