User Management¶
User management lets you add, configure, and remove user accounts within your enterprise. Each user gets a role that determines what they can see and do in DIBOP.
Accessing User Management¶
Navigate to SETTINGS > User Management in the sidebar. You must have the Enterprise Admin role to manage users.
Viewing Users¶
The User Management page displays a table of all users in your enterprise:
| Column | Description |
|---|---|
| Name | User's display name |
| User's email address (used for login) | |
| Role | Assigned role (Enterprise Admin, Viewer, etc.) |
| Status | Active or Deactivated |
| Last Login | When the user last signed in |
| Created | When the account was created |
Searching and Filtering¶
- Search: Type a name or email to filter the list
- Filter by Role: Show only users with a specific role
- Filter by Status: Show only active or deactivated users
Adding a User¶
- Click Add User
- Fill in the user details:
| Field | Description | Required |
|---|---|---|
| The user's email address (used as their login ID) | Yes | |
| Display Name | The name shown in the UI | Yes |
| Role | The role to assign | Yes |
| Send Invitation | Whether to send a welcome email with login instructions | Recommended |
- Click Save
If "Send Invitation" is checked, the user receives an email with:
- A link to set their password (if not using SSO)
- Instructions for logging in
- A link to this documentation
SSO Users
If your enterprise uses SSO, users are provisioned automatically when they first log in through the identity provider. You may still need to assign roles manually.
Editing a User¶
- Click on a user's name to open their profile
- Editable fields:
- Display Name
- Role
- Notification preferences
- Click Save Changes
Changing a User's Role¶
When you change a user's role, the new permissions take effect immediately:
- If the user is currently signed in, their sidebar and available actions update on the next page navigation
- No sign-out/sign-in is required
See Roles & Permissions for what each role can do.
Deactivating a User¶
Deactivating a user prevents them from signing in without deleting their account:
- Find the user in the list
- Click the three-dot menu and select Deactivate
- Confirm the deactivation
A deactivated user:
- Cannot sign in
- Does not appear in active user counts
- Retains their account and history (for audit purposes)
- Can be reactivated at any time
Reactivating a User¶
- Filter the user list to show deactivated users
- Find the user and click Reactivate
- The user can sign in again immediately
Deleting a User¶
Permanently delete a user account:
- Find the user in the list
- Click the three-dot menu and select Delete
- Confirm the deletion
Permanent Action
Deleting a user permanently removes their account. Any orchestrations they created will remain but will show "Deleted User" as the creator. If you may need the account again, deactivate instead.
User Activity Log¶
View what a user has done in DIBOP:
- Click on a user's name
- Select the Activity tab
- The activity log shows:
| Event | Details |
|---|---|
| Login | Timestamp, IP address, device |
| Orchestration Created | Orchestration name, timestamp |
| Orchestration Executed | Orchestration name, execution ID, timestamp |
| Connection Created | System name, timestamp |
| Settings Changed | What was changed, timestamp |
| Alert Acknowledged | Alert name, timestamp |
The activity log is read-only and retained according to the audit log retention policy.
Bulk Operations¶
Bulk Role Change¶
- Select multiple users using the checkboxes
- Click Bulk Actions > Change Role
- Select the new role
- Confirm
Export User List¶
Click Export to download the user list as CSV, including:
- Name, email, role, status, last login, created date
User Limits¶
Your enterprise may have a limit on the number of active users, depending on your subscription plan:
| Plan | Max Active Users |
|---|---|
| Starter | 5 |
| Professional | 25 |
| Enterprise | Unlimited |
If you attempt to add a user beyond your limit, you will see a warning. Contact your platform administrator to request additional user slots.
Best Practices¶
- Use the principle of least privilege: Assign the minimum role required for each user's responsibilities
- Deactivate instead of deleting: Keep accounts for audit trail purposes unless deletion is required by policy
- Review access regularly: Periodically review the user list to identify accounts that are no longer needed
- Use SSO where possible: SSO provides automatic provisioning and centralised authentication management
- Monitor the activity log: Check for unusual activity patterns that might indicate security issues
Next Steps¶
- Roles & Permissions -- understand what each role can do
- Enterprise Settings -- configure authentication requirements
- SSO / Identity -- set up single sign-on