Users

You have the flexibility to add users without any limitations. Additionally, you can modify user information, enable or disable two-factor authentication (2FA), and whitelist user IPs. It's important to note that there are two authentication options for users: 2FA and IP whitelist. However, only one option can be active at a time. If you enable 2FA, the IP whitelist functionality will be inactive, and vice versa.

Within the user settings, you can allocate specific permissions from an extensive list to individual users. Furthermore, an audit log feature is available, allowing you to comprehensively review all activities performed by a user.

User List

Thank you for sharing the visual and explaining the functionality of the user management module. Here’s an overview of the key features of this interface based on your description:


User Management Features

1. User Overview Section

  • Name: Displays the user's full name.

  • Company: Indicates the organization the user is associated with.

  • Email: Shows the registered email address of the user.

  • Status: Represents the current activation state of the user (e.g., "In-active").

  • Google 2FA: Indicates whether Google Two-Factor Authentication is enabled or disabled.

  • Total IPs: Reflects the count of whitelisted IPs for the user.


2. Tabs for User Actions

  • Edit Tab: Allows editing of the user's basic details such as:

    • Name

    • Email

    • Status

  • Permissions Tab: Enables the configuration of the user's access levels. Actions might include:

    • Assigning or revoking roles.

    • Enabling or disabling specific module access.

  • IP Whitelist Tab: Used to whitelist or manage allowed IPs for the user. This ensures secure access by restricting login attempts to pre-approved IP addresses.

  • Google 2FA Tab: Provides the ability to:

    • Enable or disable Google Two-Factor Authentication.

    • Configure the 2FA setup for enhanced security.

  • Audit Log Tab: Displays a history of actions performed by or on the user, including:

    • Login attempts.

    • Permission changes.

    • Updates to user details.


Purpose and Benefits

This structured user management system ensures:

  • Security: IP whitelisting and Google 2FA reduce unauthorized access risks.

  • Transparency: Audit logs provide traceability for all user-related actions.

  • Customizability: The permissions and edit tabs allow dynamic control over user access and details.

  • Scalability: The system can support a growing number of users while maintaining robust control.

Let us know if you’d like further assistance with enhancing or automating any of these functionalities!

Last updated