User Management

Category Updated Aug 4, 2025 Help Categories
Team Access Control

Proper user management ensures your team has appropriate access while maintaining security. These guides cover everything from basic user setup to advanced permission management.

Effective user management is crucial for team productivity and system security. Learn to manage user accounts, roles, and permissions for optimal team collaboration.

## User Management Articles ### Core User Administration
Managing User Accounts and Roles
8 min read

Comprehensive guide to user account management, role assignment, and permission control.

  • User roles overview
  • Permission management
  • Multi-branch access
  • Activity monitoring
Read Article
Adding and Managing Users
6 min read

Step-by-step guide to adding new team members and managing their account information.

  • User creation process
  • Invitation management
  • Account activation
  • Profile management
Read Article
### Advanced User Management
Roles and Permissions
10 min read

Detailed guide to understanding and configuring user roles and permission systems.

  • Role definitions
  • Custom permissions
  • Security policies
  • Access control
Read Article
Branch Access Control
7 min read

Learn to manage user access across multiple business locations and branches.

  • Multi-branch setup
  • Location-based access
  • Traveling staff
  • Branch reporting
Read Article
## User Role Overview ### Standard User Roles
Organization Owner

Full system access including billing, user management, and all settings.

All Access Billing Users
Manager

Branch management, staff supervision, and comprehensive reporting access.

Branch Mgmt Reports Staff
Staff

Order processing, customer service, and basic reporting capabilities.

Orders Customers Basic Reports
Accountant

Financial reporting, transaction history, and accounting data access.

Financial Reports Read-Only
## User Management Workflow ### Typical User Lifecycle
From Invitation to Active User
Create
Add user account
Invite
Send invitation
Activate
User sets password
Assign
Set roles & permissions
Train
Provide training
Active
Productive user
## Security Best Practices ### Access Control Guidelines
Security Essentials:
  • Principle of Least Privilege: Give users minimum necessary access
  • Regular Access Reviews: Quarterly review of user permissions
  • Immediate Deactivation: Remove access for departing employees
  • Strong Passwords: Enforce password complexity requirements
  • Activity Monitoring: Track user actions and login patterns
### Password and Authentication
Authentication Standards:
  • Password Complexity: Minimum 8 characters with mixed case, numbers, symbols
  • Two-Factor Authentication: Enable 2FA for sensitive roles
  • Session Management: Automatic logout after inactivity
  • Login Monitoring: Track failed login attempts
  • Account Lockout: Temporary lockout after multiple failures
## Common Scenarios ### Frequently Asked Questions **Q: How many users can I add?** A: User limits depend on your subscription plan. Check your plan details for specific limits. **Q: Can users access multiple branches?** A: Yes, users can be assigned to multiple branches with different permission levels for each. **Q: What happens when a user leaves?** A: Deactivate their account immediately. Their data remains for historical purposes. **Q: Can I create custom roles?** A: Yes, you can create custom roles with specific permission combinations. **Q: How do I reset a user's password?** A: Send a password reset link through the user management interface. ## Multi-Branch Considerations ### Managing Distributed Teams
Location-Based Access

Control which branches users can access and manage location-specific permissions.

Traveling Staff

Manage users who work across multiple locations with temporary access controls.

## Quick Reference ### User Status Meanings - **Active**: User can log in and access assigned features - **Inactive**: User cannot log in but data is preserved - **Pending**: Invitation sent but not yet accepted - **Suspended**: Temporary access restriction - **Locked**: Account locked due to security issues ### Permission Categories - **Orders**: Create, edit, delete, and process orders - **Customers**: Manage customer information and history - **Products**: Handle inventory and product catalog - **Reports**: Access various business reports - **Settings**: Modify system configuration - **Users**: Manage other user accounts ## Training and Onboarding ### New User Checklist
Onboarding Steps:
  1. Create user account with appropriate role
  2. Send invitation and ensure activation
  3. Provide system training and documentation
  4. Assign mentor or supervisor for first week
  5. Schedule follow-up training sessions
  6. Monitor performance and adjust permissions as needed
## Next Steps ### Related Topics After mastering user management, explore: #### **System Administration** - [System Settings](https://sederly.com/help/system-settings) - Organization configuration - Security policies #### **Multi-Branch Management** - [Multi-Branch Setup](https://sederly.com/help/multi-branch-setup) - Branch-specific settings - Cross-location reporting #### **Training and Support** - User training programs - Performance monitoring - Ongoing support strategies ## Need Help? ### Support Resources - **User Management Support**: Specialized help with complex user scenarios - **Security Consultation**: Guidance on access control best practices - **Training Resources**: Materials for team training and onboarding - **Implementation Support**: Help with large-scale user deployments
Was this article helpful?