Step 1 — Navigate to the Portal URL
Open the SinglePoint portal URL provided by your company administrator over an authorized network — corporate office LAN, VPN exit point, or home network whitelisted by your administrator. TLS 1.2 or higher is required; legacy browsers without modern cipher support will not connect. Verify the browser padlock shows a valid certificate issued to US Bank infrastructure before entering credentials. Do not follow login links from email messages; type the URL directly or use your saved browser bookmark to reduce phishing exposure.
Step 2 — Enter Company ID, User ID, and Password
Type the company ID issued by your SinglePoint administrator. The company ID identifies the corporate account and scopes user ID uniqueness. Type the user ID provisioned for your operator role, then type your password. The platform blocks reuse of passwords exposed in known breaches and enforces complexity rules on length, mixed character classes, and periodic rotation. If the portal challenges you for a password reset, follow the administrator-initiated workflow; self-service reset is disabled by default in treasury environments.
Step 3 — Confirm Multi-Factor Authentication
The platform presents an MFA challenge after the password step. If you enrolled RSA SecurID, enter the six-digit code displayed on your hardware token (codes rotate every 60 seconds — enter promptly). If you enrolled push notifications, approve the notification delivered to the SinglePoint mobile app using biometric confirmation on your device. If you enrolled a FIDO2 security key, insert the key and tap to authenticate. MFA rejection usually indicates token time drift — call +1-877-272-2265 for resync walkthrough, which involves entering two consecutive codes so the authentication server recomputes the time offset.
Step 4 — Proceed to the Treasury Dashboard
On successful authentication, the portal opens the consolidated cash position view — every corporate account balance aggregated into a single dashboard. Session tokens expire after fifteen minutes of inactivity, forcing re-authentication for idle operators. High-value wire transfers require step-up authentication regardless of session age — the operator must re-challenge MFA before the payment releases, reducing the risk that a stolen session token translates into an unauthorized outbound wire.