Skip to main content

User managment

The User Management Page provides an interface for administrators to manage user accounts, their roles, and access permissions in the system. It allows for creating, editing, deleting, and reviewing all registered users along with their assigned roles.


Table structure

ColumnDescription
UsernameDisplays the unique identifier for each user.
RoleLists all roles assigned to the user, shown as badges.
ActionsProvides controls to Edit, Delete, or Manage the user.

User actions

Each row has an Actions section on the right, with the following buttons:

ButtonFunctionality
EditModify the user’s role assignments or credentials.
DeletePermanently remove the user from the system.
MoreActivate / deactivate a user or change their password.

Adding a new user

  • Click the Add user button at the top-right.
  • A form will appear prompting for:
    • Username
    • Initial password

User roles

Each user can have one or multiple roles, displayed as stylized badges. Available roles include:

RoleDescription
ViewerCan view content but cannot perform any administrative actions.
Dashboard ViewerCan access data quality and -characterization dashboard.
AdminFull system-wide administrative privileges.
User AdminCan manage user accounts (create, update, assign roles, delete).
Job RunnerHas permissions to execute background jobs, tasks, or processes.
InactiveAccount is disabled; user cannot log in or perform any operations.

Role management guidelines

  • Only users with Admin or User Admin roles can:
    • Add or remove users
    • Assign roles
    • Change role assignments
  • Role combinations determine access levels (e.g., Admin + Job Runner for full system control)
  • Default role for research users should be Viewer.
note
  • Roles are cumulative; a user with multiple roles inherits all corresponding permissions.
  • Inactive users cannot perform any operations or access the system.

Best practices

  • Use unique, descriptive usernames.
  • Assign least privilege roles to prevent accidental misuse.
  • Review and clean up inactive or outdated user accounts regularly.
  • Log user activities for auditing (if system supports it).