Onboarding Plan - Phase 1: Configuration
In this initial phase, you'll configure user permissions and establish system-wide settings. This foundation ensures that your system is secure and that users have the appropriate permissions to perform their tasks effectively.
This phase is exclusive for System Administrators.
The System Administrator
The System Administrator is a user with system administration duties and other super powers. Admins are responsible for setting up the system for their organizations and making sure it runs smoothly.
When the system is provisioned, the System Administrator role is assigned to a user nominated by the organization. This role grants the System Administrator full permissions within the system, which must be handled with caution due to the extensive access it provides.
Enable Multi-Factor Authentication (MFA) on System Administrator Accounts
Given the extensive access granted to the System Administrator (admin), it is crucial to ensure that their account is highly secure. To achieve this, it is highly recommended for System Administrators to enable Multi-Factor Authentication (MFA) using an authenticator app. This will provide an additional layer of security, safeguarding admin access to the system.
Learn how to enable MFA with an authenticator app.
Security Settings
Password Policy
An effective password policy is essential for maintaining the security and integrity of user accounts. This policy sets the minimum requirements that users' passwords must meet and includes additional settings, such as the frequency at which users must update their passwords (optional).
Configure the Password Policy for your Organisation
Enforce Multi-Factor Authentication on Your Organisation (MFA)
While using an authenticator app on a mobile device for MFA is optional and available as an opt-in feature, System Administrators have the capability to enforce MFA for all users within the organization. By enforcing this option, all users will be required to enter a code sent to their email, in addition to their username and password, to gain access to the system. This added layer of security helps protect against unauthorized access and ensures the integrity of user accounts.
Enable MFA on your Organisation
Other Settings
Company Information
The company information shows details about the company subscription and some default settings.
Roles and Permissions
Note: If you are not planning to grant access to other users yet, you can skip this section.
Roles are the foundation of a structured access control system. They streamline access management by grouping permissions into logical units. Permissions are assigned to roles, which are then assigned to users. The permissions that each user has are determined by the roles assigned to them. This approach simplifies the process of managing access rights and ensures that users have the appropriate level of access based on their assigned roles.
Users
Note: If you are not planning to grant access to other users yet, you can skip this section.
After creating the first role(s), it is time to create the users.
Assign Additional Roles to A User