Profile
Check and Update Personal and Company Information
Keep your profile up to date by reviewing and modifying essential details such as your name, email address, phone number, and physical address. It’s important to maintain accurate contact information to ensure seamless communication and service delivery.
Enable Two-Factor Authentication (2FA)
Strengthen your account’s security by enabling Two-Factor Authentication (2FA). This additional layer of security requires not just your password but also a secondary form of verification (such as a code sent to your mobile device) to log in, protecting your account from unauthorized access.
User Administration
User Management
Easily add new users by entering key information, including a username, email address, and generating a secure password. After creating the user, you can assign them a specific role to control their access and permissions within the system. This ensures that each user only has the level of access necessary for their role.
Role Assignment and Permissions
Once a user is added, you can assign them a role that defines their access rights. Permissions can be customized for each module, with three distinct levels of access:
-
Read: The user can view data and information in the module but cannot make any changes.
-
Write: The user can modify and update the data within the module but cannot manage all settings.
-
Full Control: The user has complete control over the module, including reading, writing, and managing configurations.
Customizable Permissions for Each Module
You have the flexibility to assign specific permissions for various modules depending on the user’s role and the access required. Modules include:
-
Configurations: Manage device and system configurations.
-
Applications: Control app installation, removal, and application management.
-
Geo Locator: Monitor and manage location-based services.
-
Devices: Access and manage enrolled devices.
-
OS Update: Control the deployment and scheduling of operating system updates.
-
Security Insights: Review and act on security alerts and reports.
-
Compliance & Reports: Generate compliance reports and track adherence to organizational policies.
-
Announcements: Create and distribute announcements to groups of users.
-
Content Sharing: Manage and monitor the sharing of files, media, and other content.
-
Admin: Oversee administrative settings and user roles.
-
Settings: Configure general system settings and preferences.
Granular Access Control
Users are given access only to the specific modules and permissions that you have allowed. This ensures that sensitive data and actions are restricted to authorized personnel, providing a robust layer of security and control over your system.