SerenQuantDocs
Sign up
Sign up
© 2026 SerenQuant. All rights reserved.
DocsPrivacyTermsStatusSupport
Docs
Documentation
Start here
Overview
Guide library
GuidesGetting Started: APIGetting Started: MCPAuth + Workspace ScopesAccount and Workspace ManagementMarkets WorkspaceMarkets Symbol WorkspaceMarket Guides and Beta ScopeFutures ReadinessResearch WorkflowResearch Workbench, Pipeline, and ExperimentsResearch Specialist MethodsResearch Context SurfacesBacktests Run LifecycleBacktests Run Detail and CompareStrategy Sweeps and OptimizerExecution WorkflowProviders and BenchmarkingSettings and Runtime ConfigAgent WorkbenchNews WorkflowDatasets WorkflowGlobal Language SelectionMFA Getting StartedMFA Recovery + Device LossMFA Trusted DevicesMFA API ReferenceLLM Market Analysis LoopStrategy Generation + Backtest LoopPromotion + Risk Guardrails
Reference
API ReferenceMCP Reference
Lifecycle
Changelog
  1. Docs/
  2. Guides/
  3. Account and Workspace Management
Public docs

Guide: Account and Workspace Management

Manage profile identity, email verification, MFA, sessions, linked identities, workspace memberships, and destructive account actions from the account surface.

Signed-in account surface

Use the account surface as the control plane for identity, security, and workspace membership.

This guide maps the signed-in account experience so users can update profile settings, secure the session model, and move cleanly between personal identity and workspace access tasks.

  • Use /account as the main destination for profile, security, connected accounts, memberships, saved items, activity, and destructive actions.
  • Treat email verification, password state, MFA posture, sessions, and trusted devices as one security workflow rather than isolated controls.
  • Handle workspace joins and membership review from the account surface before you move into product workflows that assume a stable primary workspace.

Routes and surfaces

These are the product surfaces that currently define the account and workspace-management experience.

/account

Account home

Identity hero, onboarding summary, profile editing, saved items, recent activity, and the main section navigation.

/signin | /signup | /verify-email

Auth entry points

Sign in, sign up, and email-verification routes gate the first session and the verified-account lifecycle.

/account#security

Security controls

Password state, MFA setup and disable flows, backup codes, sessions, and trusted-device review live under the security section.

/account#workspaces | /workspaces/invites/[token]

Workspace memberships

Review memberships, primary workspace labeling, and invite-token joins from the account workspace section.

/account#connectedAccounts

Connected accounts

Link or unlink Google, NAVER, and Kakao identities that feed the sign-in surface.

/account#savedItems | /account#dangerZone

Activity and danger zone

Audit recent actions, load more activity rows, sign out all sessions, or deactivate the account.

Recommended account loop

Follow this sequence so identity and workspace changes remain coherent across sign-in, verification, and downstream product access.

01

Stabilize profile identity first

Update username, display name, avatar URL, locale, and timezone before you treat saved items or workspace activity as durable context.

02

Close verification gaps early

Resend the verification email if needed so recovery flows, invite acceptance, and account trust signals stay available.

03

Align linked identities with sign-in policy

Review Google, NAVER, or Kakao bindings before you rotate passwords, tighten MFA, or expect teammates to use the same identity path.

Security controls and review points

These are the concrete controls users will touch most often when they secure the account surface.

Credential state

Password setup and rotation

The security card changes shape based on whether the account already has a password, so first-time password creation and normal rotation are documented as separate states.

MFA operations

Setup, regeneration, and disable flows

The MFA panel is the operational center for enrollment, backup-code regeneration, disable actions, and the visible method or trusted-device counters.

Session review

Current session lock plus per-session revoke

Recent sessions show user-agent, IP, relative last-seen time, expiry, a current-session lock, and the option to revoke one row or all other sessions.

Remembered devices

Trusted-device inventory

Trusted devices surface last-seen and expiry timestamps per device, then allow targeted revocation without disabling MFA entirely.

Session and trusted-device controls

  • Use the current-session badge as the guardrail that prevents users from accidentally revoking the browser session they are actively using.
  • The revoke-others action is the fastest way to clear stale device access after a password reset, role change, or suspicious sign-in event.
  • Trusted-device labels, last-seen timestamps, and expiry timestamps give users enough context to distinguish routine remembered devices from risky ones.
  • Document session and trusted-device review together because users usually revisit them in response to the same security concern.

Workspace operations

These controls define how personal identity and workspace reachability meet on the account page.

Role inventory

Membership list and primary workspace

Membership rows expose workspace_id, role, join date, and a primary-workspace chip so the user can confirm the exact workspace context before moving elsewhere.

Join flow

Invite-token acceptance

The join panel accepts a raw invite token, executes the membership join, and immediately changes what signed-in routes and roles are reachable.

Identity bridges

Connected providers

Google, NAVER, and Kakao rows expose provider email, linked timestamp, and connect or unlink actions so sign-in policy stays aligned with the account's preferred identity path.

Audit and recovery

  • Saved items and activity history help users explain why the account surface changed before they take recovery action.
  • The activity card logs route and method context, which is useful when a user is tracing unexpected account or workspace changes.
  • Sign-out-all and deactivate actions belong at the end of the page because they are destructive recovery controls, not routine navigation.
  • Document the danger zone as the final escalation path after session review, MFA review, and connected-account checks have already happened.

Next steps

Auth and workspace scopes

Review session, token, workspace-header, and role boundaries that sit underneath the account surface.

MFA getting started

Go deeper on TOTP enrollment, backup-code capture, and recovery expectations.

Settings and runtime config

Continue into signed-in posture, token-security, and runtime-policy controls after account setup is stable.

Last updated

Mar 24, 2026

Feedback

Report unclear guidance, stale contracts, missing coverage, or broken docs UI on this page.

Open feedback issue
Previous
Auth + Workspace Scopes
Next
Markets Workspace
On this page

Jump to the section you need without losing your place.

  • Use the account surface as the control plane for identity, security, and workspace membership.
  • Routes and surfaces
  • Recommended account loop
  • Security controls and review points
  • Session and trusted-device controls
  • Workspace operations
  • Audit and recovery
  • Next steps
Last updated

Mar 24, 2026

Feedback

Report unclear guidance, stale contracts, missing coverage, or broken docs UI on this page.

Open feedback issue