Skip to main content

User Management

Role-based access control and permissions

Comprehensive RBAC system with custom roles, granular permissions, customer groups, and multi-organization access for enterprise security.

22
Total Features
5
Role Features
4
Admin Features
4
Security Features

Predefined Role Templates

Start with these battle-tested role configurations or customize them to match your organizational needs

Company Admin

Full access to all features and settings

Access Level
Service Provider Level
Key Features
  • All Privileges
  • User Management
  • System Configuration
  • Billing Access

Manager

Supervise operations with limited settings access

Access Level
Service Provider / Customer Level
Key Features
  • View All Objects
  • Reports
  • User Supervision
  • Limited Settings

Operator

Day-to-day alarm monitoring and processing

Access Level
Customer / Site Level
Key Features
  • Alarm Processing
  • Live View
  • Event History
  • Device Control

End User

Limited access for customer self-service

Access Level
Customer / Site Level
Key Features
  • Dashboard View
  • Site Control
  • Basic Reports
  • No Admin Access
Showing 22 of 22 features
Basic

Role-Based Access Control (RBAC)

Comprehensive RBAC system with predefined and custom roles defining granular permissions for every feature and function across the platform.

Learn more
Intermediate

Creating Custom Roles

Build tailored roles with specific privilege combinations matching your organizational structure and security requirements.

Learn more
Basic

Access Levels

Three-tier access hierarchy (Service Provider, Customer, Site) controlling scope of user visibility across the organizational structure.

Learn more
Intermediate

Privilege Configuration

Granular permission control across apps, categories, and actions (view, create, edit, delete) for precise access management.

Learn more
Basic

Session Timeout Management

Role-level session timeout configuration (30-1440 minutes) ensuring automatic logout for security compliance.

Learn more
Basic

User Invitation System

Email-based invitation workflow with role assignment, customer group selection, and multi-organization access configuration.

Learn more
Advanced

Multi-Organization Access

Enable single user accounts to access multiple tenants/organizations with distinct roles per organization for enterprise flexibility.

Learn more
Basic

User Status Management

Activate, deactivate, or suspend user accounts with immediate effect on login capabilities and existing sessions.

Learn more
Intermediate

Bulk User Operations

Efficiently manage multiple users simultaneously with batch invite, role assignment, and access level updates.

Learn more
Intermediate

Customer Groups

Flexible customer segmentation restricting user access to specific customer subsets without creating separate roles for each.

Learn more
Intermediate

Customer Group Configuration

Create, edit, and manage customer groups with active/inactive status and flexible customer membership assignment.

Learn more
Advanced

Data Segregation

Enforce strict data isolation between customer groups preventing cross-customer visibility for multi-tenant security.

Learn more
Intermediate

Production/Test Environment Separation

Segregate production sites from test environments using customer groups to prevent operator confusion and test alarm interference.

Learn more
Intermediate

Permissions Matrix

Comprehensive permission mapping showing which roles have access to specific features, actions, and data scopes.

Learn more
Basic

Password Policies

Enforce strong password requirements including complexity rules, expiration policies, and password history tracking.

Learn more
Advanced

Two-Factor Authentication (2FA)

Optional 2FA enforcement for enhanced account security with support for authenticator apps and SMS verification.

Learn more
Advanced

Single Sign-On (SSO)

Enterprise SSO integration with SAML 2.0 and OAuth 2.0 for seamless authentication across corporate identity providers.

Learn more
Intermediate

Operator Privilege Adjustment

Fine-tune operator permissions for Talos alarm monitoring including alarm actions, site access, and administrative functions.

Learn more
Advanced

Operator Groups & Alarm Routing

Organize operators into groups for targeted alarm routing, shift management, and workload distribution.

Learn more
Advanced

User Activity Logging

Complete audit trail of user actions including logins, configuration changes, alarm actions, and data access for compliance.

Learn more
Advanced

User Analytics

Dashboard analytics showing user login patterns, feature usage, session duration, and role distribution metrics.

Learn more
Intermediate

Access Reports

Generate detailed reports on user access patterns, permission changes, and role assignments for security audits.

Learn more