Guardline

    Users

    Manage user accounts and role assignments in the Platform UI.

    User Management

    The Users section in the Platform UI provides comprehensive tools for managing user accounts, role assignments, and access control. This is where administrators create user accounts, assign roles, and maintain the security of the platform.

    Overview

    Users management dashboard

    The Users dashboard displays all user accounts in your organization with their associated information, roles, and current status. Use this view to quickly find users, review their access levels, and perform account management tasks.

    User List View

    Search and Filtering

    Find specific users quickly using:

    • Text search β€” Search by name, email, or user ID
    • Role filter β€” Filter by specific roles (e.g., Admin, Compliance Officer)
    • Status filter β€” View active or inactive users

    List Columns

    The user list displays the following information:

    ColumnDescription
    USERUser's full name
    EMAILUser's email address
    ROLEAssigned roles (can have multiple)
    STATUSAccount status (Active/Inactive)
    LAST ACCESSLast login date and time
    ACTIONSQuick action buttons

    Quick Actions

    Each user row provides three action buttons:

    • πŸ‘οΈ View β€” View user details
    • ✏️ Edit β€” Modify user information and roles
    • πŸ—‘οΈ Delete β€” Remove user account

    Creating a New User

    Create user modal

    To create a new user account:

    1. Navigate to Management > Users
    2. Click the New user button in the top right
    3. Fill in the required information:
      • ID β€” Unique identifier (auto-generated)
      • Email β€” User's email address (will be used for login)
      • Name β€” User's full name
      • Password β€” Initial password for the account
      • Confirm Password β€” Re-enter password to confirm
      • Role β€” Select one or more roles to assign
    4. Click Save to create the account

    Password Requirements

    When creating user accounts, ensure passwords meet security requirements:

    • Minimum length (typically 8+ characters)
    • Mix of uppercase and lowercase letters
    • Include numbers
    • Include special characters

    The user will receive their login credentials via the specified email address.

    Editing User Information

    Edit user modal

    To modify an existing user:

    1. Click the Edit (pencil) icon next to the user
    2. Update any of the following:
      • Name β€” User's display name
      • Email β€” Email address
      • Role β€” Add or remove role assignments
    3. Click Save to apply changes

    Note: The user ID is automatically generated and cannot be modified.

    Role Assignments

    Users can be assigned multiple roles simultaneously. When a user has multiple roles, they receive the combined permissions of all assigned roles.

    Common Role Combinations

    Senior Compliance Officer:

    • Admin (for configuration access)
    • Compliance_officer_crm (for case management)

    Analyst with Review Rights:

    • Compliance_officer (for review capabilities)
    • Solo creditos (for specific feature access)

    User Status Management

    Active Status

    • User can log in and access the platform
    • All assigned permissions are in effect
    • Appears in user lists and reports

    Inactive Status

    To deactivate a user:

    1. Edit the user account
    2. Change status to Inactive
    3. Save changes

    Inactive users:

    • Cannot log in to the platform
    • Retain their account data for audit purposes
    • Can be reactivated if needed

    Deleting Users

    To permanently remove a user:

    1. Click the Delete (trash) icon next to the user
    2. Confirm the deletion

    Warning: Deleting a user is permanent and cannot be undone. Consider deactivating users instead if you may need to restore access later.

    Last Access Tracking

    The LAST ACCESS column shows when each user last logged into the platform. This helps you:

    • Identify inactive accounts
    • Monitor user activity
    • Detect unusual access patterns
    • Audit user engagement

    If a user shows "β€”" in the Last Access column, they have never logged in.

    User Account Security

    Password Management

    Initial Setup:

    • Administrators set initial passwords when creating accounts
    • Users should change their password on first login

    Password Resets:

    • Users can request password resets via the login page
    • Administrators can reset passwords by editing the user account

    Session Management

    User sessions are managed automatically:

    • Sessions expire after a period of inactivity
    • Users must log in again after session expiration
    • Concurrent sessions may be limited based on configuration

    Bulk Operations

    For managing multiple users efficiently:

    1. Export User List β€” Download user data for reporting or analysis
    2. Role-based Selection β€” Use role filters to perform actions on groups of users
    3. Status Updates β€” Activate or deactivate multiple users

    Best Practices

    1. Unique Email Addresses β€” Each user must have a unique email address
    2. Role Assignment Review β€” Regularly audit user role assignments to ensure appropriate access
    3. Inactive Account Cleanup β€” Periodically review and deactivate accounts that haven't been accessed recently
    4. Least Privilege β€” Assign only the roles necessary for each user's job function
    5. Onboarding Process β€” Have a standard process for creating and provisioning new user accounts
    6. Offboarding Process β€” Immediately deactivate or delete accounts when users leave the organization
    7. Naming Conventions β€” Use consistent naming formats (e.g., "First Last" or "Last, First")
    8. Email Verification β€” Verify email addresses are correct before creating accounts

    Troubleshooting

    User Cannot Log In

    Check the following:

    1. Account status is Active
    2. Email address is correct
    3. Password is correct (offer password reset if needed)
    4. User has at least one role assigned
    5. Roles have appropriate permissions

    Missing Permissions

    If a user reports missing functionality:

    1. Check their assigned roles
    2. Verify role permissions in the Roles section
    3. Ensure permissions are properly configured

    Duplicate Email Error

    If you receive a duplicate email error:

    1. Search for existing users with that email
    2. Either update the existing account or use a different email

    Security & Compliance

    • Access Logs β€” All user actions are logged for audit purposes
    • Role Changes β€” Changes to user roles are tracked with timestamps
    • Failed Login Attempts β€” Monitored to detect suspicious activity
    • Account Lockout β€” Accounts may be locked after multiple failed login attempts
    • Data Privacy β€” User information is stored securely and access is restricted to authorized administrators