Overview
Your Recruitier account contains sensitive recruitment data — candidate profiles, client information, outreach history, and business contacts. Keeping your account secure protects both your data and your clients’ trust. This page covers password management, session security, and best practices.Changing Your Password
To change your password:Find the password section
Look for the Password Settings card on the left side of the settings page,
below your profile information.
Enter your current password
Type your current password to verify your identity. This step prevents
unauthorized password changes if someone gains temporary access to your
logged-in session.
Enter your new password
Type your new password. Make sure it meets the password requirements listed
below.
Changing your password invalidates all existing JWT tokens across all devices.
This effectively logs you out from every other device and browser, providing an
immediate security response if you suspect unauthorized access.
Password Requirements
Your password must meet the following criteria to ensure account security:- Minimum length — At least 8 characters long
- Complexity — A mix of uppercase letters, lowercase letters, and numbers is strongly recommended
- Uniqueness — Do not reuse passwords from other services
Forgot Your Password
If you have forgotten your password and cannot log in:Go to the login page
Navigate to app.recruitier.com/login.
Check your email
You will receive an email with a password reset link. Click the link to set a
new password.
The password reset link expires after a limited time for security reasons. If the
link has expired, request a new one by repeating the forgot password process.
Check your spam folder if the email does not arrive within a few minutes.
Logging Out from All Devices
If you suspect that someone else has access to your account, or if you simply want to ensure that all sessions are terminated:- Change your password using the steps above
- Changing your password invalidates all existing JWT tokens
- All other sessions will be required to log in again with the new password
Security Best Practices
Use a Strong, Unique Password
Choose a password that is:- At least 12 characters long (longer is better)
- A combination of letters, numbers, and special characters
- Not used for any other service or website
- Not based on personal information (birthdays, names, addresses)
Use a Password Manager
Consider using a password manager like 1Password, Bitwarden, or KeePass to generate and store strong, unique passwords for all your accounts, including Recruitier. Password managers eliminate the need to remember complex passwords and make it easy to use a different password for every service.Be Cautious with Shared Devices
If you access Recruitier from a shared or public computer:- Always log out when you finish your session
- Never save your password in the browser on shared devices
- Use private or incognito browsing mode when possible
- Clear the browser cache after your session
Recognize Phishing Attempts
Recruitier will never ask you for your password via email. If you receive an email that appears to be from Recruitier asking for your password or login credentials, it is likely a phishing attempt. Do not click any links in suspicious emails. Instead, go directly to app.recruitier.com in your browser.Keep Your Email Secure
Your Recruitier account is linked to your email address. If someone gains access to your email, they could use the password reset feature to access your Recruitier account. Make sure your email account is also protected with a strong password and, ideally, two-factor authentication.Regular Password Updates
While there is no mandatory password rotation policy, it is good practice to change your password every few months, especially if:- You suspect your credentials may have been compromised
- You shared your password with someone temporarily
- You used your password on an untrusted network or device
- You received a data breach notification from another service where you use the same password
Advanced
Authentication Architecture
Recruitier uses JWT (JSON Web Tokens) for session management. Here is how the authentication system works:| Component | Detail |
|---|---|
| Token algorithm | HS256 (HMAC with SHA-256) |
| Token expiry | Approximately 2 days |
| Password hashing | bcrypt with automatic salting |
| Token revocation | Database flag + Redis cache (5-minute TTL) |
- Token revocation takes effect within 5 minutes across all sessions
- The Redis cache significantly reduces database load during authentication checks
- After 5 minutes, all cached tokens are refreshed from the database
- New login requests always check the database directly (cache miss on first check)
- You submit your email and password
- The password is verified against the bcrypt hash stored in the database
- A JWT token is generated with your user ID and expiry timestamp
- The token is returned to your browser and stored for subsequent API requests
- Each API request includes the token, which is validated against the revocation cache
- Your current password is verified
- The new password is hashed with bcrypt and stored
- All existing tokens for your account are marked as revoked
- The revocation cache in Redis is updated
- Your current session receives a new valid token
- All other sessions will fail authentication within 5 minutes (cache TTL)
OAuth2 Email Security
Your connected email providers (Gmail/Outlook) use a completely separate authentication mechanism (OAuth2). Changing your Recruitier password does not affect your email connections. Similarly, changing your Gmail or Outlook password may invalidate the OAuth2 tokens, requiring you to reconnect in Recruitier, but does not affect your Recruitier login.Data Protection
Recruitier implements several layers of data protection:- Encryption in transit — All communication uses TLS/SSL encryption
- Encryption at rest — Database data is encrypted using AWS-managed encryption
- Infrastructure security — The platform runs on AWS with managed databases, automated backups, and infrastructure monitoring
- Role-based access — Agency team members have role-based permissions (Admin, Admin Member, Member) controlling what data they can access
- Payment isolation — All payment data is handled exclusively by Stripe (PCI DSS Level 1 compliant) and never stored in Recruitier’s systems

