Users¶

Purpose: Manage user accounts, permissions, and receiver visibility.
1. When to use¶
- When adding or removing operators.
- When updating access scopes or receiver visibility for security.
2. Sections and why they matter¶
2.1 Users table¶
Each row represents a user account.
ID,Name,Login: identity fields used in audits and login.Password: masked by default.Scopes: permissions granted to the user (for example, settings, events, objects). Limit scopes to reduce risk.Visible receivers: which receiver instances the user can access.Token time: token validity period, which affects session lifetimes and security posture.

2.2 Add User and removal¶
Use Add User to create a new account. The red X action removes a user and should be used with explicit approval.

2.3 Operational checks and actions¶
Use two quick passes when changing accounts: first monitor active risk signals, then confirm policy alignment before handover.
Monitor these in runtime:
- Scope expansion for existing accounts. Alert cue: users gain settings/control privileges outside role.
Token timetoo long on privileged accounts. Alert cue: persistent elevated sessions.- User removals during active response windows. Alert cue: sudden access loss for on-duty operators.
Confirm before production use:
- Allowed scopes are only
users,settings,objects,device_control,events,omit_mpass,restart_services,turnoff_receiver,license. token_timeis in range1..5,256,000minutes.idis unique and greater than0;loginandpasswordare not empty.- If
visible_receivers.all = false, the custom receiver list is not empty. - New account login and expected scope behavior are verified before handing over credentials.
- User count remains within license allowance.
3. Common procedures¶
3.1 Create a new user¶
- Open
Userstab and selectAdd User.
- Fill in account identity fields (
Name,Login, password).
- Assign minimum required
Scopesfor the role.

- Set
Visible receiversto only required instances.

- Set
Token timeaccording to security policy.

- Save settings and validate login with the new account.

3.2 Change a user password¶
- Locate the target account in
Userstable. - Enable password visibility only if required for controlled verification.

- Update password for the account and save.

- Confirm the user can authenticate with the new password.
- Disable password visibility after verification.
4. Hardening checklist¶
- Keep
administratorfor emergency use only; use named accounts for daily operations. - Assign least-privilege
Scopesper role (monitoring, operations, integration admin). - Restrict
Visible receiversso users only see required instances. - Set shorter
Token timefor high-privilege users and rotate credentials regularly. - Remove stale accounts and verify owner/role at scheduled intervals.