Private status pages for internal and customer communication

Restrict access with Azure AD, Google Workspace, any OIDC provider, IP allowlisting, email magic links, or a shared password — no public exposure.
Keep operational visibility secure and share it only with the right people.

Access Control

Access control that actually works

Six access methods — pick the one that fits your audience, or combine them.

Azure AD / SSO

Authenticate with Microsoft Entra ID. Anyone outside your tenant is blocked automatically — no account setup required.

Google Workspace

Let your team sign in with their Google Workspace account. Restrict to your domain — anyone outside is blocked automatically.

Generic OIDC

Connect any OpenID Connect provider — Okta, Auth0, Keycloak, and more. Works with any standard OIDC issuer.

IP allowlisting

Restrict access to specific IP addresses or ranges. Visitors from outside allowed networks are blocked without any login prompt.

Email magic links

Grant access to specific email addresses. Visitors request a one-time login link — no password or Microsoft account needed.

Shared password

Set a single password for the page. Simple to set up — good for small teams or short-lived internal pages.

Use Cases

Built for real-world operational visibility

Private status pages fit naturally into how modern teams already communicate.

Internal IT dashboards

Show the status of internal tools, corporate systems, and shared infrastructure to your IT team without a public footprint.

Branch / office connectivity

Let distributed teams check connectivity and service status for their location without contacting IT support first.

Customer-specific status pages

Share a dedicated status page with an enterprise customer. They see only their environment — no one else's data.

Vendor / partner visibility

Give vendors or integration partners a secure window into the services that affect them, without opening it to the public.

Secure by design

One platform, secure by design

  • No public exposure unless you choose it. Pages are private by default. Flip a switch to make them public — or keep them locked to your identity provider forever.
  • Works with your existing identity system. Azure AD, Google Workspace, or any OIDC provider — use what your team already authenticates with. No new directory, no new accounts.
  • No additional tools needed. Configure private access directly from your status page settings — no third-party SSO middleware required.

Private status page — access restricted

Ready to share status securely?

Set up a private status page in minutes. Azure AD, Google Workspace, OIDC, IP allowlisting, and more — available on paid plans.

Create private status page

14-day free trial • No credit card required