Skip to content

User Management

User management lets you add, configure, and remove user accounts within your enterprise. Each user gets a role that determines what they can see and do in DIBOP.


Accessing User Management

Navigate to SETTINGS > User Management in the sidebar. You must have the Enterprise Admin role to manage users.


Viewing Users

The User Management page displays a table of all users in your enterprise:

Column Description
Name User's display name
Email User's email address (used for login)
Role Assigned role (Enterprise Admin, Viewer, etc.)
Status Active or Deactivated
Last Login When the user last signed in
Created When the account was created

Searching and Filtering

  • Search: Type a name or email to filter the list
  • Filter by Role: Show only users with a specific role
  • Filter by Status: Show only active or deactivated users

Adding a User

  1. Click Add User
  2. Fill in the user details:
Field Description Required
Email The user's email address (used as their login ID) Yes
Display Name The name shown in the UI Yes
Role The role to assign Yes
Send Invitation Whether to send a welcome email with login instructions Recommended
  1. Click Save

If "Send Invitation" is checked, the user receives an email with:

  • A link to set their password (if not using SSO)
  • Instructions for logging in
  • A link to this documentation

SSO Users

If your enterprise uses SSO, users are provisioned automatically when they first log in through the identity provider. You may still need to assign roles manually.


Editing a User

  1. Click on a user's name to open their profile
  2. Editable fields:
    • Display Name
    • Role
    • Notification preferences
  3. Click Save Changes

Changing a User's Role

When you change a user's role, the new permissions take effect immediately:

  • If the user is currently signed in, their sidebar and available actions update on the next page navigation
  • No sign-out/sign-in is required

See Roles & Permissions for what each role can do.


Deactivating a User

Deactivating a user prevents them from signing in without deleting their account:

  1. Find the user in the list
  2. Click the three-dot menu and select Deactivate
  3. Confirm the deactivation

A deactivated user:

  • Cannot sign in
  • Does not appear in active user counts
  • Retains their account and history (for audit purposes)
  • Can be reactivated at any time

Reactivating a User

  1. Filter the user list to show deactivated users
  2. Find the user and click Reactivate
  3. The user can sign in again immediately

Deleting a User

Permanently delete a user account:

  1. Find the user in the list
  2. Click the three-dot menu and select Delete
  3. Confirm the deletion

Permanent Action

Deleting a user permanently removes their account. Any orchestrations they created will remain but will show "Deleted User" as the creator. If you may need the account again, deactivate instead.


User Activity Log

View what a user has done in DIBOP:

  1. Click on a user's name
  2. Select the Activity tab
  3. The activity log shows:
Event Details
Login Timestamp, IP address, device
Orchestration Created Orchestration name, timestamp
Orchestration Executed Orchestration name, execution ID, timestamp
Connection Created System name, timestamp
Settings Changed What was changed, timestamp
Alert Acknowledged Alert name, timestamp

The activity log is read-only and retained according to the audit log retention policy.


Bulk Operations

Bulk Role Change

  1. Select multiple users using the checkboxes
  2. Click Bulk Actions > Change Role
  3. Select the new role
  4. Confirm

Export User List

Click Export to download the user list as CSV, including:

  • Name, email, role, status, last login, created date

User Limits

Your enterprise may have a limit on the number of active users, depending on your subscription plan:

Plan Max Active Users
Starter 5
Professional 25
Enterprise Unlimited

If you attempt to add a user beyond your limit, you will see a warning. Contact your platform administrator to request additional user slots.


Best Practices

  1. Use the principle of least privilege: Assign the minimum role required for each user's responsibilities
  2. Deactivate instead of deleting: Keep accounts for audit trail purposes unless deletion is required by policy
  3. Review access regularly: Periodically review the user list to identify accounts that are no longer needed
  4. Use SSO where possible: SSO provides automatic provisioning and centralised authentication management
  5. Monitor the activity log: Check for unusual activity patterns that might indicate security issues

Next Steps