Skip to main content

User Management

ADMIN Beginner

Manage users and accounts in the EZ-Console admin interface.

Overview​

The User Management interface allows administrators to create, edit, disable, and manage user accounts. This guide covers all user management operations available in the admin console.

Accessing User Management​

Navigate to: Authorization β†’ Users

Service accounts​

Service accounts represent non-human callers (automation, integrations) and are managed alongside interactive users:

  1. Go to Authorization β†’ Service Accounts (or the Service Accounts entry under Authorization, depending on your build)
  2. Create an account and store the issued secret or API key securely; treat it like a password
  3. Rotate keys on a schedule or after compromise; revoke unused accounts
  4. Assign roles with the minimum permissions requiredβ€”same RBAC model as users (Role & Permission Management)

User List​

Viewing Users​

The user list displays:

  • Username
  • Email address
  • Full name
  • Status (Active/Inactive)
  • Roles
  • Last login time
  • Created date

Searching and Filtering​

  • Search: Search by username, email, or full name
  • Filter by Status: Active, Inactive, or All
  • Filter by Role: Filter users by assigned roles

Pagination​

  • Use pagination controls to navigate through users
  • Adjust page size (10, 20, 50, 100 items per page)

Creating Users​

Create New User​

  1. Click Create User button
  2. Fill in user information:
    • Username: Unique username (required)
    • Email: Email address (required)
    • Full Name: Display name (optional)
    • Password: Initial password (required)
    • Status: Active or Inactive
    • Roles: Assign roles to user
  3. Click Save

Editing Users​

Update User Information​

  1. Click on a user in the list
  2. Click Edit button
  3. Update user information
  4. Click Save

Change Password​

  1. Open user detail page
  2. Click Reset Password
  3. Enter new password
  4. Confirm password
  5. Click Save

Note: Users can change their own password from their profile page.

User Status​

Activate User​

  1. Select user(s) from list
  2. Click Activate
  3. Confirm activation

Deactivate User​

  1. Select user(s) from list
  2. Click Deactivate
  3. Confirm deactivation

Note: Deactivated users cannot log in but their data is preserved.

Delete User​

  1. Select user(s) from list
  2. Click Delete
  3. Confirm deletion

Warning: Deleted users cannot be recovered. Consider deactivating instead.

Assigning Roles​

Assign Roles to User​

  1. Open user detail page
  2. Go to Roles tab
  3. Click Assign Roles
  4. Select roles to assign
  5. Click Save

Remove Roles​

  1. Open user detail page
  2. Go to Roles tab
  3. Click Remove next to role
  4. Confirm removal

User Details​

View User Information​

Click on a user to view:

  • Basic Information: Username, email, full name, status
  • Roles: Assigned roles and permissions
  • Sessions: Active sessions
  • Audit Logs: User activity history
  • MFA Settings: Multi-factor authentication status

User Sessions​

View Active Sessions​

  1. Open user detail page
  2. Go to Sessions tab
  3. View all active sessions with:
    • IP address
    • User agent
    • Login time
    • Last activity

Revoke Sessions​

  1. Go to Sessions tab
  2. Select session(s)
  3. Click Revoke
  4. Confirm revocation

Password Management​

Reset Password​

Administrators can reset user passwords:

  1. Open user detail page
  2. Click Reset Password
  3. Enter new password
  4. Optionally require password change on next login
  5. Click Save

Password Policies​

Password requirements are enforced based on system settings:

  • Minimum length
  • Complexity requirements
  • Expiration (if enabled)

User Import/Export​

Export Users​

  1. Go to User List
  2. Click Export
  3. Choose format (CSV, Excel)
  4. Download file

Import Users​

  1. Go to User List
  2. Click Import
  3. Download template
  4. Fill in user data
  5. Upload file
  6. Review and confirm

Best Practices​

1. Use Strong Passwords​

Ensure users have strong passwords that meet security policies.

2. Assign Appropriate Roles​

Only assign roles that users need for their work.

3. Regular Review​

Regularly review user accounts:

  • Deactivate inactive users
  • Remove unnecessary roles
  • Update user information

4. Audit Trail​

Monitor user activity through audit logs.


Need help? Ask in GitHub Discussions.