logo
logo

User management: onboarding/offboarding

With the increased adoption of Cloud Services, IT is facing some new and complex problems. IT teams today are continually striving to improve security for both their internal processes, but also for end-users. Any IT manager whose organization is looking to modernize is challenged with onboarding new employees; managing the creation of User access, assigning Roles; setting Authorization. And subsequently to manage the offboarding process that can entail some significant security risks.

We implement powerful User management, including the definition of Roles and Authorization. Allied to this user management is the powerful User activity monitoring (UAM) functionality.

User management

User management is a core part of every application. User management enables superusers to control user access, create new users and delete old users. For further information on User Management, please see User Management.

Security policies

This section describes user group policy configuration. In general, User Group Policies are applied by assigning users to the appropriate user group or groups. Users assigned to a particular user group will be assigned all the user group policies. Note that changes to user permissions have a significant impact on the security model. It is advised that only experienced superusers should make changes to user group policies. For further information on Roles and Authorization, please see Security policies.

User activity monitoring (UAM)

In the field of information security, User activity monitoring (UAM) is the monitoring and recording of user actions. UAM captures user actions and is recorded in the User logs. The User logs document all activities by users. The User logs match up with a playback of concurrent actions or events of all the users. For further information on User activity monitoring (UAM), please see User activity monitoring.

Can we improve this article ? Provide feedback