User management: onboarding/offboarding

With the increased adoption of Cloud Services, IT is facing some new and complex problems. IT teams today are continually striving to improve security for both their internal processes and their end users. Any IT manager whose organization is looking to modernize is challenged with onboarding new employees, managing user access, assigning user roles, and setting authorization methods, and subsequently managing the offboarding process that can pose some significant security risks.

We implement powerful User management tools, including definitions for user roles and authorization, as well as the powerful User Activity Monitoring (UAM) functionality.

User management

User management is a core part of every application. User management enables superusers to control user access, create new users and delete old users. For further information on User Management, please see User Management.

Security policies

This section describes user group policy configuration. In general, User Group Policies are applied by assigning users to the appropriate user group or groups. Users assigned to a particular user group will be assigned all the user group policies. Note that changes to user permissions have a significant impact on the security model. It is advised that only experienced superusers should make changes to user group policies. For further information on Roles and Authorization, please see Security policies.

User Activity Monitoring (UAM)

In the field of information security, User activity monitoring (UAM) is the monitoring and recording of user actions. UAM captures user actions and is recorded in the User logs, which document all user activities. The User logs match up with a playback of concurrent actions or events of all the users. For further information on User Activity Monitoring (UAM), please see User activity monitoring.

Do you have some feedback for us?

If you have suggestions for improving this article,