[Gestion]

Users Administration

The Users Administration module provides day-to-day user management capabilities for administrators to invite, configure, monitor, and manage user accounts within their organization. From invitation-based onboarding thro

Metadonnees du module

The Users Administration module provides day-to-day user management capabilities for administrators to invite, configure, monitor, and manage user accounts within their organization. From invitation-based onboarding thro

Retour à la Liste

Reference source

content/modules/admin-users-management.md

Dernière Mise à Jour

5 févr. 2026

Catégorie

Gestion

Étiquettes

management

Documentation rendue

Cette page rend le Markdown et Mermaid du module directement depuis la source publique de documentation.

Overview#

The Users Administration module provides day-to-day user management capabilities for administrators to invite, configure, monitor, and manage user accounts within their organization. From invitation-based onboarding through role assignment and activity monitoring to account suspension and deactivation, the module covers the complete user lifecycle with appropriate controls and audit trails.

Key Features#

  • User Lifecycle Management - Manage users through their complete account lifecycle: invitation, activation, active use, suspension, and deactivation. Each status transition is logged and can trigger automated notifications to affected users and administrators.

  • Invitation-Based Onboarding - Invite users via email with pre-assigned roles and department placement. Invitations include customizable messages, expire after a configurable period, and can be resent with updated details. Users complete their profile setup upon accepting the invitation.

  • Role-Based Access - Assign users to predefined roles (Admin, Manager, Analyst, Investigator, Viewer) that control access to platform capabilities. Each role provides a clear set of permissions, and administrators can view permission comparisons when changing roles to understand what access is gained or lost.

  • User Activity Monitoring - Track login history, session counts, feature usage, investigation participation, and API activity per user. Engagement metrics including daily and monthly active users, feature adoption rates, and session duration provide operational insight into how the platform is being used.

  • Department Management - Organize users into hierarchical departments with department-specific permissions, cost allocation, and designated managers. Support cross-department collaboration while maintaining appropriate access boundaries.

  • Account Suspension and Deactivation - Suspend accounts temporarily with configurable durations and documented reasons, or deactivate accounts permanently with ownership transfer options for investigations and documents. All actions revoke active sessions and are fully auditable.

  • Bulk Operations - Perform bulk invitations from CSV, bulk role changes, bulk deactivation, and bulk permission updates for efficient management of large user populations.

  • Security Controls - Password policy enforcement, MFA management, session controls, failed login tracking, and suspicious activity detection work together to maintain account security across the organization.

Use Cases#

  • Team onboarding with batch invitations that assign appropriate roles and departments, enabling new team members to be productive from their first login.
  • Access governance through regular activity monitoring that identifies inactive accounts, tracks MFA adoption, and ensures users have appropriate roles for their current responsibilities.
  • Security incident response with immediate account suspension, session revocation, and documented audit trails that support investigation and remediation.
  • Organizational changes using bulk operations to efficiently update roles, departments, and permissions when teams are restructured or projects change scope.

Getting Started#

  1. Review Roles - Understand the available roles and their permissions to plan appropriate access levels for your team.
  2. Invite Users - Send invitations with appropriate role assignments and department placement.
  3. Monitor Onboarding - Track invitation acceptance and first-time login activity to ensure smooth onboarding.
  4. Establish Reviews - Set up regular access reviews to maintain appropriate permissions and identify inactive accounts.
  5. Configure Security - Set password policies, MFA requirements, and session controls appropriate for your organization.

Availability#

  • Enterprise Plan: Included (all features, advanced activity monitoring, bulk operations, anomaly detection)
  • Professional Plan: Core user management included; advanced monitoring and bulk operations available as add-on

Last Reviewed: 2026-02-05