User Management
The User Management page is accessible only to administrators. It provides tools to create, edit, deactivate, and delete user accounts, assign roles, and configure resource access patterns.
Accessing User Management
Section titled “Accessing User Management”-
Click the user profile icon in the top-right corner.
-
Select Admin from the dropdown menu.
-
The User Management page loads, displaying all registered users.
User Dashboard
Section titled “User Dashboard”The user dashboard displays a table with the following columns:
| Column | Description |
|---|---|
| User’s email address (unique identifier) | |
| Name | First and last name |
| Role | Assigned role (Admin, Operator, Member, or Service) |
| Access | Summary of resource access patterns (e.g., “Full access”, “3 patterns”, “No patterns”) |
| Provider | Authentication provider (Local or OAuth) |
| Password | Password status indicator |
| Active | Toggle to activate or deactivate the account |
| Last Login | Timestamp of the user’s most recent login |
| Actions | Edit and Delete controls |
| Role | Description |
|---|---|
| Admin | Full access to all features, including user management and license administration |
| Operator | Full migration access (create, monitor, cutover jobs) without user management or license administration |
| Member | Limited access, restricted by resource access patterns configured by an administrator |
| Service | Used for service accounts. This role cannot be assigned through the UI but appears in the user table for accounts provisioned externally |
Adding a New User
Section titled “Adding a New User”-
Click the Add User button on the User Management page.
-
Enter the user’s Email address. This serves as the unique identifier and cannot be changed after creation.
-
Optionally enter the First Name and Last Name.
-
Select a Role from the dropdown (Admin, Operator, or Member).
-
The system generates an auto-generated temporary password. Copy this password and share it with the user through a secure channel.
-
Optionally configure a Password Expiry to enforce periodic password changes.
-
Configure Access Patterns for Topics, Schemas, and Consumer Groups (see Resource Access Patterns below).
-
Click Save to create the user account.
Editing a User
Section titled “Editing a User”-
Locate the user in the dashboard table.
-
Click the Edit action button in the user’s row.
-
Update the Name, Role, Password Expiry, or Access Patterns as needed.
-
Click Save to apply the changes.
Resetting a Password
Section titled “Resetting a Password”-
Open the Edit User dialog for the target user.
-
Click Reset Password.
-
The system generates a new auto-generated temporary password.
-
Copy the temporary password and share it with the user through a secure channel.
-
Click Save to confirm.
The user will be prompted to update their password on the next login.
Authentication Providers
Section titled “Authentication Providers”| Provider | Description |
|---|---|
| Local | Passwords are managed within the application. Password reset is available through the admin panel. |
| OAuth | Authentication is handled by an external identity provider. In-app password reset is not available for these accounts. |
See SSO Configuration for details on setting up OAuth authentication.
Activating and Deactivating Users
Section titled “Activating and Deactivating Users”Each user row includes an Active toggle:
- Active: The user can log in and access the suite based on their role and access patterns.
- Deactivated: The account remains in the system but the user cannot log in. Deactivation is reversible by toggling the switch back.
Deleting a User
Section titled “Deleting a User”Click the Delete action in the user’s row and confirm the deletion in the dialog. This action is permanent and irreversible. All user data, including access patterns and activity history references, are removed.
Resource Access Patterns
Section titled “Resource Access Patterns”Access patterns control which resources a user can see and manage. They apply to three resource types:
Define patterns that match topic names. For example, a pattern of orders-* grants access to all topics whose name starts with orders-.
Define patterns that match schema subject names. Patterns follow the same wildcard syntax as topic patterns.
Define patterns that match consumer group IDs. Patterns follow the same wildcard syntax as topic patterns.
Access Levels
Section titled “Access Levels”Each pattern is assigned one of two access levels:
| Access Level | Description |
|---|---|
| Read | User can view the resource and its status but cannot perform management actions |
| Manage | User can view the resource and perform management actions (add, remove, cutover) |
Example Configuration
Section titled “Example Configuration”| Resource Type | Pattern | Access Level |
|---|---|---|
| Topics | orders-* | Manage |
| Topics | analytics-* | Read |
| Schemas | orders-* | Manage |
| Consumer Groups | order-processing-* | Manage |
Access Column Summary
Section titled “Access Column Summary”The Access column in the user dashboard provides a quick summary:
| Display | Meaning |
|---|---|
| Full access | No restrictions applied (Admin, Operator, and Service roles) |
| N patterns | Number of access patterns configured |
| No patterns | No access patterns defined, user has no resource visibility |