Skip to main content
Skip table of contents

Onboarding Plan - Phase 1: Configuration

In this initial phase, you'll configure user permissions and establish system-wide settings. This foundation ensures that your system is secure and that users have the appropriate permissions to perform their tasks effectively.

This phase is exclusive for System Administrators.

The System Administrator

The System Administrator is a user with system administration duties and other super powers. Admins are responsible for setting up the system for their organizations and making sure it runs smoothly.

When the system is provisioned, the System Administrator role is assigned to a user nominated by the organization. This role grants the System Administrator full permissions within the system, which must be handled with caution due to the extensive access it provides.

Enable Multi-Factor Authentication (MFA) on System Administrator Accounts

Given the extensive access granted to the System Administrator (admin), it is crucial to ensure that their account is highly secure. To achieve this, it is highly recommended for System Administrators to enable Multi-Factor Authentication (MFA) using an authenticator app. This will provide an additional layer of security, safeguarding admin access to the system.

Learn how to enable MFA with an authenticator app.

Security Settings

Password Policy

An effective password policy is essential for maintaining the security and integrity of user accounts. This policy sets the minimum requirements that users' passwords must meet and includes additional settings, such as the frequency at which users must update their passwords (optional).

Configure the Password Policy for your Organisation

Enforce Multi-Factor Authentication on Your Organisation (MFA)

While using an authenticator app on a mobile device for MFA is optional and available as an opt-in feature, System Administrators have the capability to enforce MFA for all users within the organization. By enforcing this option, all users will be required to enter a code sent to their email, in addition to their username and password, to gain access to the system. This added layer of security helps protect against unauthorized access and ensures the integrity of user accounts.

Enable MFA on your Organisation

Other Settings

Company Information

The company information shows details about the company subscription and some default settings.

View Company Information

Roles and Permissions

Note: If you are not planning to grant access to other users yet, you can skip this section.

Roles are the foundation of a structured access control system. They streamline access management by grouping permissions into logical units. Permissions are assigned to roles, which are then assigned to users. The permissions that each user has are determined by the roles assigned to them. This approach simplifies the process of managing access rights and ensures that users have the appropriate level of access based on their assigned roles.

Create the First Role(s)

Users

Note: If you are not planning to grant access to other users yet, you can skip this section.

After creating the first role(s), it is time to create the users.

Create Users

Assign Additional Roles to A User

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.