Skip to content

User Management

The User Management page is accessible only to administrators. It provides tools to create, edit, deactivate, and delete user accounts, assign roles, and configure resource access patterns.

  1. Click the user profile icon in the top-right corner.

  2. Select Admin from the dropdown menu.

  3. The User Management page loads, displaying all registered users.

The user dashboard displays a table with the following columns:

ColumnDescription
EmailUser’s email address (unique identifier)
NameFirst and last name
RoleAssigned role (Admin, Operator, Member, or Service)
AccessSummary of resource access patterns (e.g., “Full access”, “3 patterns”, “No patterns”)
ProviderAuthentication provider (Local or OAuth)
PasswordPassword status indicator
ActiveToggle to activate or deactivate the account
Last LoginTimestamp of the user’s most recent login
ActionsEdit and Delete controls
RoleDescription
AdminFull access to all features, including user management and license administration
OperatorFull migration access (create, monitor, cutover jobs) without user management or license administration
MemberLimited access, restricted by resource access patterns configured by an administrator
ServiceUsed for service accounts. This role cannot be assigned through the UI but appears in the user table for accounts provisioned externally
  1. Click the Add User button on the User Management page.

  2. Enter the user’s Email address. This serves as the unique identifier and cannot be changed after creation.

  3. Optionally enter the First Name and Last Name.

  4. Select a Role from the dropdown (Admin, Operator, or Member).

  5. The system generates an auto-generated temporary password. Copy this password and share it with the user through a secure channel.

  6. Optionally configure a Password Expiry to enforce periodic password changes.

  7. Configure Access Patterns for Topics, Schemas, and Consumer Groups (see Resource Access Patterns below).

  8. Click Save to create the user account.

  1. Locate the user in the dashboard table.

  2. Click the Edit action button in the user’s row.

  3. Update the Name, Role, Password Expiry, or Access Patterns as needed.

  4. Click Save to apply the changes.

  1. Open the Edit User dialog for the target user.

  2. Click Reset Password.

  3. The system generates a new auto-generated temporary password.

  4. Copy the temporary password and share it with the user through a secure channel.

  5. Click Save to confirm.

The user will be prompted to update their password on the next login.

ProviderDescription
LocalPasswords are managed within the application. Password reset is available through the admin panel.
OAuthAuthentication is handled by an external identity provider. In-app password reset is not available for these accounts.

See SSO Configuration for details on setting up OAuth authentication.

Each user row includes an Active toggle:

  • Active: The user can log in and access the suite based on their role and access patterns.
  • Deactivated: The account remains in the system but the user cannot log in. Deactivation is reversible by toggling the switch back.

Click the Delete action in the user’s row and confirm the deletion in the dialog. This action is permanent and irreversible. All user data, including access patterns and activity history references, are removed.

Access patterns control which resources a user can see and manage. They apply to three resource types:

Define patterns that match topic names. For example, a pattern of orders-* grants access to all topics whose name starts with orders-.

Each pattern is assigned one of two access levels:

Access LevelDescription
ReadUser can view the resource and its status but cannot perform management actions
ManageUser can view the resource and perform management actions (add, remove, cutover)
Resource TypePatternAccess Level
Topicsorders-*Manage
Topicsanalytics-*Read
Schemasorders-*Manage
Consumer Groupsorder-processing-*Manage

The Access column in the user dashboard provides a quick summary:

DisplayMeaning
Full accessNo restrictions applied (Admin, Operator, and Service roles)
N patternsNumber of access patterns configured
No patternsNo access patterns defined, user has no resource visibility