Skip to main content

User Management

The User Management page allows system administrators to view, manage, and control user access to the organization.

Accessing User Management

  1. Navigate to your organization dashboard
  2. Click "Users" in the sidebar navigation
  3. You'll see a list of all users with access to your organization

Note: User management is typically restricted to system administrators and organization administrators.

Users List

The users list displays:

  • Name: User's full name
  • Email: User's email address (used for login)
  • Role: User's role or permission level
  • Status: Active, Inactive, or Pending
  • Last Login: When the user last accessed the system
  • Organization: Which organization(s) the user belongs to
  • Actions: Management actions available

User Roles and Permissions

System Administrator

  • Full access to all organizations and funds
  • Can manage users across the entire platform
  • Can access system-level settings

Organization Administrator

  • Full access to their organization
  • Can manage users within their organization
  • Can create and manage funds
  • Can access all organization features

Fund Manager

  • Access to specific funds
  • Can manage fund operations
  • Can view and edit fund data
  • Limited access to organization settings

Viewer

  • Read-only access
  • Can view reports and data
  • Cannot make changes or transactions

Adding Users

Inviting New Users

  1. Click the "Add User" or "Invite User" button
  2. Enter the user's email address
  3. Select the user's role
  4. Assign to organization(s) or fund(s)
  5. Send invitation

User Registration Process

  1. User receives an invitation email
  2. User clicks the invitation link
  3. User signs in with their Google account
  4. User is automatically added to the organization
  5. User can now access the platform

Managing Users

Editing User Information

  1. Click on a user's name or email
  2. Click "Edit" to modify user details
  3. Update role, permissions, or organization assignments
  4. Save changes

User Actions

From the users list, you can:

  • View Details: See user profile and activity
  • Edit Permissions: Change user role and access
  • Deactivate: Temporarily disable user access
  • Remove: Remove user from organization
  • Resend Invitation: Resend invitation email if needed

User Statuses

Active

User has access and can log in. All permissions are active.

Inactive

User account is deactivated. User cannot log in or access the system.

Pending

User has been invited but hasn't completed registration yet.

Searching and Filtering

Search Functionality

  • Search Bar: Search by name or email address
  • Real-time Results: Results update as you type

Filtering Options

  • Role: Filter by user role (Admin, Manager, Viewer, etc.)
  • Status: Filter by Active, Inactive, or Pending
  • Organization: Show users for specific organizations
  • Last Login: Filter by last login date

Security Best Practices

Access Control

  1. Principle of Least Privilege: Assign minimum necessary permissions
  2. Regular Audits: Review user access regularly
  3. Remove Inactive Users: Deactivate users who no longer need access
  4. Monitor Activity: Review user activity logs

Password and Authentication

  • Users authenticate via Google OAuth (no passwords to manage)
  • Two-factor authentication is handled by Google
  • Session management is automatic

User Activity

Viewing User Activity

  1. Navigate to a user's detail page
  2. View activity log showing:
    • Login history
    • Actions performed
    • Funds accessed
    • Reports generated

Audit Trail

All user actions are logged for:

  • Security auditing
  • Compliance requirements
  • Troubleshooting
  • Activity monitoring

Troubleshooting

User Cannot Log In

  • Verify user status is "Active"
  • Check that user is assigned to an organization
  • Verify user's email matches invitation
  • Check if user needs to accept invitation

Permission Issues

  • Verify user's role has required permissions
  • Check organization assignments
  • Review fund-level access restrictions
  • Contact system administrator if needed