User Roles Overview

Administrator

Full administrative access

  • Complete platform configuration rights

  • User management capabilities

  • Access to all features and settings

  • Can modify system configurations

  • Full read/write access across all sections

Typical responsibilities:

  • Managing platform configurations

  • User administration

  • System setup and maintenance

  • Integration management

  • Alert configuration

Security Analyst

Full operational access without administrative rights

  • Complete read/write access to platform features

  • No access to settings page

  • Cannot modify system configurations

Typical responsibilities:

  • Incident management

  • Secret detection investigation

  • Report generation

  • Alert monitoring

  • Security assessment

Developer

Read-only access

  • Can view incidents and reports

  • No write permissions

  • Cannot modify any platform settings

  • Cannot take actions on incidents

Typical responsibilities:

  • Viewing security incidents

  • Monitoring repository status

  • Accessing security reports

  • Reviewing scan results

Adding New Users

Prerequisites

  • Administrator role

  • User details (username, email, password)

  • Determined role for new user

  • Intended user status

Steps to Add a User

  1. Navigate to Settings > User Management

  2. Click the Add User button

  3. Fill in the required information:

    • Username

    • Email address

    • Password

    • Role (Admin/Security Analyst/Dev)

    • Status (Active/Inactive)

  4. Click Add to create the user

Important Considerations

  • Choose roles based on user responsibilities

  • Use strong passwords

  • Verify email addresses

  • Set appropriate status

  • Review access requirements regularly

Best Practices

User Management

  • Regularly audit user accounts

  • Remove inactive users promptly

  • Update roles as responsibilities change

  • Enforce strong password policies

  • Review access logs periodically

Role Assignment

  • Follow the principle of least privilege

  • Assign roles based on job requirements

  • Regularly review role assignments

  • Document role changes

  • Maintain user role inventory

Security Recommendations

  1. Regular Access Review

    • Audit user accounts quarterly

    • Verify role assignments

    • Update permissions as needed

    • Remove unnecessary access

  2. User Onboarding

    • Verify user identity

    • Provide role-specific training

    • Document access granted

    • Set up monitoring

  3. User Offboarding

    • Promptly disable accounts

    • Remove access rights

    • Archive user data

    • Document removal

Troubleshooting

Common Issues:

  • Unable to access certain features

    • Verify user role

    • Check account status

    • Clear browser cache

  • Login problems

    • Reset password

    • Verify email

    • Check account status

Need assistance? Contact your system administrator or support team for help.