StatusPage.me Help Center

Popular topics: creating a status page, connecting monitors, automatic incidents, custom domains, integrations and billing.

StatusPage.me Mar 21, 2026 Status Pages

Private Status Pages

By default, status pages are public — anyone with the link can view them. Private mode lets you restrict access so only authorised visitors can see your page. This is useful for internal IT status pages, customer-specific pages, or any situation where you don’t want information publicly visible.


Enabling Private Mode

  1. Go to Status Pages and open the page you want to restrict
  2. Click Settings in the left menu, then go to the Access section
  3. Toggle Private Status Page to on
  4. Click Access Settings to configure one or more access methods
  5. Click Save Settings

Once enabled, unauthenticated visitors will see a gate page instead of your status page content.

Private status pages are available on paid plans. If the toggle is greyed out, upgrade your plan.


Access Methods

You can enable one or more access methods at the same time. Visitors who pass any single method are admitted — they work as an OR, not AND.

MethodBest for
PasswordSimple shared access for a small group
IP AllowlistOffice networks or VPNs
Email Magic LinkNamed individuals without a shared account
Azure AD / MicrosoftCompany employees via Microsoft work accounts
Google WorkspaceGoogle-based organisations
Generic OIDCAny OpenID Connect provider (Okta, Auth0, Keycloak, etc.)

Tip: The IP allowlist is checked silently — matching visitors bypass the gate page entirely without any login step.


Password

Set a single shared password that visitors enter to unlock the page.

Setting a password

  1. Open Access Settings
  2. Expand the Password section
  3. Type your chosen password (minimum 4 characters)
  4. Click Save Access Settings

Changing or removing a password

  1. Open Access Settings → Password
  2. Click Change Password to set a new one, or Remove Password to disable it
  3. Save

When you change or remove a password, an email notification is sent to the account owner as a security alert.

Sessions granted by a password last 1 hour. Visitors can log out at any time by visiting /?logout=1 on your status page URL.


IP Allowlist

Automatically admit visitors whose IP address matches an entry in your allowlist — no login required.

Adding IPs

  1. Open Access Settings → IP Allowlist
  2. Toggle Enable IP allowlist on
  3. Enter one IP address or CIDR range per line, for example:
    203.0.113.42
    10.0.0.0/8
    192.168.1.0/24
    
  4. Save

Notes

  • CIDR notation is supported for ranges (e.g. your entire office subnet)
  • Visitors on an allowed IP are admitted transparently — they never see the gate page
  • Combine with password or magic links so remote workers who aren’t on the VPN can still access the page

Send a one-time login link to an email address. Useful for named external stakeholders you want to grant access without sharing a password.

  1. Open Access Settings → Email Magic Link
  2. Toggle Enable email magic link on
  3. Enter the email addresses that are allowed to request a link (one per line)
  4. Optionally enable Also allow team members to automatically include anyone with team access to the status page
  5. Set the link expiry (15 minutes, 30 minutes, or 1 hour)
  6. Save

How visitors use it

  1. Visitor arrives at the gate page and enters their email address
  2. If the email is on the allowlist, they receive an email with a login link
  3. Clicking the link grants a 1-hour session
  4. To prevent email enumeration, the page always says “check your inbox” — even if the address is not on the list

Rate limiting

Each email address is limited to 3 magic link requests per 10 minutes.


Azure AD / Microsoft

Allow employees to sign in using their existing Microsoft work account (Azure Active Directory). No shared password or manual email list required — anyone in your organisation’s Azure AD tenant can authenticate.

This is a paid plan feature and requires registering an application in your Azure AD tenant.

See the full Azure AD setup guide →


Google Workspace

Allow employees to sign in using their Google Workspace account. You can optionally restrict access to a specific hosted domain (e.g. acme.com).

This is a paid plan feature and requires creating an OAuth 2.0 client in Google Cloud Console.

See the full Google Workspace setup guide →


Generic OIDC

Connect any OpenID Connect provider — Okta, Auth0, Keycloak, Ping Identity, and others. The platform automatically discovers endpoints from the standard OIDC discovery document.

This is a paid plan feature.

See the full Generic OIDC setup guide →


Allowed Email Domains

After any SSO login (Azure AD, Google, or OIDC), you can further restrict access by email domain. Enter one domain per line in Access Settings → Allowed Email Domains. Visitors whose email domain is not in the list are denied even after a successful SSO authentication. Leave blank to allow all domains.


Combining Methods

You can enable multiple methods simultaneously. The recommended combinations for common scenarios:

ScenarioRecommended setup
Internal company page (Microsoft)Azure AD + IP allowlist (office)
Internal company page (Google)Google Workspace + IP allowlist (office)
Mixed internal/externalAzure AD or Google for employees, magic link for contractors
Enterprise IdP (Okta, Auth0)Generic OIDC + allowed email domains
Simple team pagePassword
Customer-specific pageMagic link with customer email

Session Behaviour

Regardless of which method grants access, sessions work the same way:

  • Sessions last 1 hour from the time of authentication
  • Sessions are stored in a browser cookie (sp_auth_<page-id>)
  • Visitors can log out at any time by adding ?logout=1 to any URL on your status page (e.g. https://status.yourcompany.com/?logout=1)
  • Closing the browser does not end the session — the cookie persists

Feed Access

RSS and Atom feeds for private pages return 401 Unauthorized to unauthenticated requests. Feed readers that support HTTP authentication are not currently supported — subscribers need to access the page directly.


What’s Next?

Was this article helpful?

Share this article: