User Settings

This article will show you how to add users and gives a breakdown of different user roles.

The User settings section allows administrators to manage user access and control according to organisational roles and to ensure user details are up to date. There is a table displaying each user’s details, including name, email, role, and the teams they are part of. It also shows whether a user’s account is active, enabling administrators to monitor access and ensure that only authorised personnel can use the system functions aligned with their roles. 

Additionally, there is an option to add new users, which will open a pop up requiring user details to be entered.

To add a new user follow these steps:

  1. Click the “Add User” button in the top right hand corner.
  1. Enter details:
  • Email – Enter user email, used to send updates.
  • First Name – Enter users first name.
  • Last Name – Enter users last name.
  • Phone Number – Enter users phone number, used to send alerts.
  • Role – Select appropriate user role,

User Roles

Each user can be assigned to one of these roles:

a. Organisation Admin – a super administrator role that has the highest privilege and access to all Phoenix Security features across all Applications. The Organisation Admin can manage Applications, Components, Environments, Vulnerabilities, and Users. 

b. Organisation Admin Lite – provides the same privileges as Organisation Admin but without User Management.

c. Organisation App Admin – an administrator role that provides admin privileges on a specific Application only.

d. Application Admin – 

e. Engineering user – 

f. Security Admin – 

g. Security champion – 

User Statuses

In addition to user roles, users can also have one of these statuses:

a. Enabled – user is an active user and can log on to Phoenix Security. 

b. Disabled – user is deactivated and cannot log on to Phoenix Security. 

c. Unavailable – user is deleted from your Phoenix Security organisation.This article will show you how to add users and gives a breakdown of different user roles.

Updated on November 20, 2024

Related Articles

x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
Shield Security