Users Management
The Users section provides a centralized interface for managing all registered users within the organization. It enables administrators to monitor user activity, assign roles, manage team associations, and control access to resources.
This module plays a critical role in enforcing identity-based access control, ensuring that the right users have appropriate permissions aligned with organizational policies.
Overview Panel
At the top of the Users page, administrators can quickly view key metrics that provide insights into user distribution and status:
Total Users
Represents the total number of registered users within the organization.
Helps track overall user base growth and system usage.
Users With Team
Indicates users assigned to one or more teams.
These users are typically aligned with organizational roles and access structures.
Users Without Team
Displays users who are not assigned to any team.
Important for identifying users who may not have proper access control or policy assignment.
Active Users
Users whose accounts are currently enabled.
These users can log in and access resources based on assigned roles and policies.
Inactive Users
Users who are disabled or deactivated.
These accounts cannot access the system and are typically retained for auditing or temporary suspension.
Insight
This summary panel helps administrators:
Identify unassigned users
Monitor active vs inactive distribution
Ensure proper team-based access alignment
All Users Table
The Users Table provides a detailed view of each user and their associated attributes.
Column | Description |
|---|---|
Name | Username or display name of the user |
Registered email ID used for login and communication | |
Role | Assigned role (Owner, Admin, Editor, Viewer, Guest User) |
Active | Indicates whether the user account is enabled or disabled |
Last Login | Timestamp of the user’s most recent login |
Created At | Date when the user account was created |
Associated Teams | Number of teams the user is part of |
Actions | Options to edit, deactivate, or manage user settings |
Additional Insights
Last Login helps identify inactive or dormant accounts
Associated Teams indicates how access policies may be applied
Role column directly impacts permissions and access scope
Available Controls
Administrators are provided with multiple tools to efficiently manage users:
Search
Quickly locate users using name or email
Useful in large organizations with many users
View / Column Settings
Customize visible columns in the table
Allows administrators to focus on relevant data
Refresh
Reloads the latest user data
Ensures real-time accuracy after updates
Extended View
Provides detailed user information
May include:
Full profile details
Activity logs
Team associations
Download
Export user data for:
Auditing
Reporting
Backup
Action Menu
Perform actions on individual users:
Edit user details
Activate / Deactivate accounts
Modify roles or team assignments
Role Definitions (RBAC)
MicroZAccess implements Role-Based Access Control (RBAC) to ensure secure and structured access management.
Admin
Manages policies, configurations, and users
Cannot override Owner-level permissions
Editor
Limited configuration access
Can modify certain settings but with restrictions
Viewer
Read-only access
Can view configurations but cannot make changes
Guest User
Restricted access
Typically used for temporary or limited access scenarios
Security & Governance Considerations
Assign roles based on the principle of least privilege
Regularly review inactive users and deactivate unnecessary accounts
Ensure all users are mapped to appropriate teams
Monitor login activity to detect suspicious behavior
Key Benefits
Centralized user management
Improved visibility into user activity and status
Simplified role and access control
Enhanced security through RBAC enforcement
Efficient administration with bulk actions and export features
The Users Management module provides a comprehensive interface for managing organizational users, roles, and access. With detailed insights, flexible controls, and robust RBAC support, it ensures secure, scalable, and efficient identity management across the platform.