Skip to content

Users and Groups Management Guide

This guide provides comprehensive instructions for tenant administrators on managing users and groups through the Auth service UI.

Table of Contents


Overview

The Users and Groups section enables you to:

  • Create and manage user accounts
  • Organize users into groups for access control
  • Assign roles and permissions to users and groups
  • Monitor and audit user access

Security context: User and group management is critical for maintaining least privilege access. Proper configuration ensures users have only the permissions they need while simplifying administration through group-based access control.

Note: For platform license management (super admins only), see the License Management Guide.


Users and Groups Menu

The Users and Groups menu provides comprehensive user and group management capabilities.

Users

Location: Users and Groups > Users

Purpose: Manage individual user accounts within the tenant.

What you can do

  • View all users: Table displays username, name, email, issuer, provider, creation date, user type
  • Create users: Add new user accounts (manual creation or import)
  • Edit users: Update user properties, assign groups/roles/permissions
  • Delete users: Remove user accounts
  • Import users: Bulk import from another tenant or JSON file
  • Export users: Download user list for backup or reporting
  • View event logs: See authentication and authorization events for a user

User Types

Users are categorized based on their privileges:

  • Super Admin: Platform-wide administrator
  • Admin: Tenant administrator
  • Privileged: Member of privileged groups (elevated permissions)
  • User: Standard user (no special privileges)

Creating a User

  1. Click + ADD USER
  2. Complete the user creation dialog (see User Management Reference)
  3. Click Save

User Operations

  • Settings: Click settings icon to edit user properties
  • Delete: Click delete icon to remove user
  • Event Logs: Click binoculars icon to view user's authentication events
  • Export: Download user list with filters

Importing Users

From another tenant:

  1. Click Import Users > Import from another tenant
  2. Select source tenant
  3. Choose users to import
  4. Map to target groups (optional)
  5. Click Import

From JSON file:

  1. Click Import Users > JSON File Import
  2. Upload JSON file with user data
  3. Review import preview
  4. Click Import

JSON format example:

[
  {
    "email": "user@example.com",
    "givenName": "John",
    "familyName": "Doe",
    "username": "johndoe",
    "identityIssuer": "https://auth.example.com"
  }
]

Security recommendations:

  • Validate imported data before confirming import
  • Review user assignments after bulk operations
  • Use group-based access control rather than individual assignments
  • Audit user creation events regularly

User Groups

Location: Users and Groups > User Groups

Purpose: Organize users into groups for simplified access control and role management.

What you can do

  • View all groups: Table displays group name, description, namespace, user count, role counts, privilege status
  • Create groups: Define new user groups
  • Edit groups: Update group properties, manage members, assign roles/permissions
  • Delete groups: Remove unused groups
  • Download users: Export list of group members
  • Import users: Bulk add users to group from JSON

Group Properties

Groups display the following information in the table:

  • Name: Unique group identifier
  • Description: Purpose or scope of the group
  • Namespace: Logical isolation boundary
  • Users: Number of members
  • Client Roles: Number of app-level roles assigned
  • API Roles: Number of API-specific roles assigned
  • isPrivileged: Whether this is a privileged group (elevated permissions)

Creating a User Group

  1. Click + ADD GROUP
  2. Complete the group creation dialog (see User Group Management Reference)
  3. Click Save

Group Operations

  • Settings: Click settings icon to edit group and manage members/roles
  • Download Users: Export member list for this group
  • Import Users: Bulk add users from JSON file
  • Delete: Remove group (does not delete member users)

Use cases:

  1. Department groups: "engineering", "sales", "marketing"
  2. Role groups: "developers", "managers", "admins"
  3. Project groups: "project-alpha-team", "project-beta-viewers"
  4. Permission groups: "read-only-users", "power-users"

Best practices:

  • Use descriptive group names that reflect purpose
  • Document group purpose in description field
  • Prefer group-based access over individual user assignments
  • Review group membership quarterly
  • Use namespaces to isolate groups across environments/projects

Assigned Roles

Location: Users and Groups > Assigned Roles

Purpose: View and manage all role assignments (user-to-role mappings) across the tenant.

Availability: Tenant admins and super admins only (hidden from regular users).

What you can see

  • Global view: All role assignments in one place
  • User-role mappings: Which users have which roles
  • Role utilization: How roles are being used
  • Group-role relationships: Roles assigned via group membership

Use cases

  • Access audit: Review who has which roles
  • Compliance reporting: Document role assignments for auditors
  • Cleanup: Identify and remove unused role assignments
  • Troubleshooting: Verify user has expected role access

Security note: This is a read-only view for auditing purposes. To modify role assignments, edit the user or group directly.


Assigned Permissions

Location: Users and Groups > Assigned Permissions

Purpose: View and manage all permission assignments (user-to-permission mappings) across the tenant.

Availability: Tenant admins and super admins only (hidden from regular users).

What you can see

  • Global view: All permission assignments in one place
  • User-permission mappings: Which users have which permissions
  • Permission utilization: How permissions are being used
  • Direct vs. role-based: Permissions assigned directly vs. through roles

Use cases

  • Permission audit: Review who has access to what
  • Least privilege verification: Ensure users don't have excessive permissions
  • Compliance reporting: Document permission grants
  • Troubleshooting: Verify user has expected permissions

Security note: This is a read-only view for auditing purposes. To modify permissions, edit the user or group directly, or adjust role definitions.

Best practice: Prefer role-based permission assignment over direct grants. Direct permissions should be exceptions, not the norm.


User Management Reference

When creating or editing a user via Users > Settings icon, you'll encounter a multi-tab configuration dialog.

Creating a User

Prerequisites:

  • At least one identity provider must be configured
  • Appropriate permissions: auth.users.create or tenant admin

Process:

  1. Click + ADD USER from Users dashboard
  2. Fill in user details across tabs
  3. Click Save

User Settings Tab

Purpose: Core user profile information and authentication settings.

Identity Configuration

  • Identity Issuer* (required)
  • Select the identity provider this user will authenticate with
  • Dropdown lists all configured IdPs
  • Note: Cannot be changed after user creation
  • Format: Displays provider name and issuer URL

  • Email* (required)

  • User's primary email address
  • Must be unique within tenant+issuer combination
  • Autocomplete: As you type, suggests existing users from other tenants
  • Validation: Must be valid email format

  • Alternative Email

  • Secondary email for notifications
  • Optional field
  • Must be valid email format if provided

  • IAL (Identity Assurance Level)

  • Read-only field
  • Indicates identity verification level from IdP
  • Values: IAL1, IAL2, IAL3 (higher = stronger verification)

Profile Information

  • Username
  • Unique identifier for the user
  • Optional (defaults to email if not provided)
  • Use case: Display name different from email

  • First Name

  • User's given name
  • Optional (may be populated from IdP)

  • First Name Override

  • Override the IdP-provided first name
  • Warning: May be ignored based on tenant provider settings
  • Use case: Correct IdP data without changing source

  • Last Name

  • User's family name
  • Optional (may be populated from IdP)

  • Last Name Override

  • Override the IdP-provided last name
  • Warning: May be ignored based on tenant provider settings

  • Name

  • Full display name
  • Optional (may be computed from first + last name)

  • Name Override

  • Override the IdP-provided full name
  • Warning: May be ignored based on tenant provider settings

  • Nickname

  • Informal or preferred name
  • Optional

  • Nickname Override

  • Override the IdP-provided nickname
  • Warning: May be ignored based on tenant provider settings

Note on Overrides: Overrides allow you to correct or customize user data without modifying the identity provider. However, if the IdP is configured to always use its data, overrides may be ignored at authentication time.

License Assignment (Super Admin Only)

  • License Type
  • Assign a specific license to this user
  • Dropdown lists available licenses
  • Restriction: Only super admins can modify
  • Use case: Allocate user to specific license quota

User Expiration

  • Expire User Access on Date
  • Set an expiration date for user access
  • Toggle to enable/disable expiration
  • Date Picker: Select expiration date and time
  • Use case: Temporary access, contractor accounts, trial periods
  • Behavior: User cannot authenticate after expiration

Security recommendations:

  • Set expiration dates for temporary access
  • Use alternative email for account recovery
  • Review overrides carefully (potential for confusion)
  • Assign users to appropriate licenses for quota management

Groups Tab

Purpose: Assign the user to user groups.

Managing Group Membership

  • Current Groups: Table displays groups user is currently a member of
  • Add to Groups:
  • Autocomplete search for groups
  • Click Add to assign user to group
  • User inherits all roles and permissions from the group
  • Remove from Groups:
  • Click remove icon next to group name
  • User loses group-based roles and permissions

Group columns:

  • Name: Group identifier
  • Description: Group purpose
  • Namespace: Logical boundary
  • Remove: Remove user from group

Best practice: Use groups rather than individual role/permission assignments for easier management at scale.


Roles Tab

Purpose: Assign application-level roles directly to the user.

Managing Role Assignments

  • Current Roles: Table displays roles currently assigned to user
  • Shows roles assigned directly (not through groups)
  • Add Roles:
  • Autocomplete search for available roles
  • Click Add to assign role
  • User gains all permissions associated with the role
  • Remove Roles:
  • Click remove icon next to role name
  • User loses role's associated permissions

Role columns:

  • Name: Role identifier
  • Description: Role purpose
  • Client: Application this role belongs to
  • Permissions: Number of permissions in this role
  • Remove: Unassign role from user

Security note: Direct role assignments should be exceptions. Prefer group-based role assignment for maintainability.


Permissions Tab

Purpose: Assign individual permissions directly to the user.

Managing Permission Assignments

  • Current Permissions: Table displays permissions currently assigned
  • Shows only directly assigned permissions (not from roles or groups)
  • Add Permissions:
  • Autocomplete search for available permissions
  • Click Add to grant permission
  • User gains that specific access right
  • Remove Permissions:
  • Click remove icon next to permission name
  • User loses that access right

Permission columns:

  • Name: Permission identifier (e.g., "read:users")
  • Description: Permission purpose
  • Scope: OAuth 2.0 scope value
  • Remove: Revoke permission from user

Security warning: Direct permission assignment should be rare. Prefer roles and groups for maintainability and auditability.

Best practice: Document justification when granting individual permissions (use description field or audit comment).


Profile Data Tab

Purpose: View and manage additional user profile attributes.

Profile Attributes

  • Custom Attributes: Tenant-defined user attributes (if configured)
  • IdP Claims: Additional data from identity provider
  • Metadata: System-generated user metadata

Use cases:

  • Store department, employee ID, cost center
  • Track user preferences or settings
  • Store application-specific user data

Security note: Be cautious storing sensitive data in user profiles. Use appropriate encryption and access controls.


TOTP Tab

Purpose: Manage Time-based One-Time Password (TOTP) multi-factor authentication for the user.

TOTP Management

  • View TOTP Status: Whether user has TOTP configured
  • Reset TOTP: Remove TOTP configuration (requires re-enrollment)
  • View TOTP Secret: Display secret for manual configuration (super admin only)

Operations:

  • Reset TOTP:
  • Removes user's TOTP configuration
  • Requires user to re-enroll on next login
  • Use case: Lost device, troubleshooting

Security recommendations:

  • Only reset TOTP after verifying user identity
  • Document TOTP resets in audit comments
  • Encourage users to store backup codes
  • Consider requiring re-verification after reset

Passkeys Tab

Purpose: Manage WebAuthn/FIDO2 passkeys for phishing-resistant authentication.

Passkey Management

  • View Registered Passkeys: Table of user's registered passkeys
  • Passkey Details: Device name, registration date, last used
  • Remove Passkeys: Revoke specific passkey

Passkey columns:

  • Credential Name: User-assigned name (e.g., "iPhone", "YubiKey")
  • AAGUID: Authenticator attestation GUID (device type identifier)
  • Registered: Date passkey was added
  • Last Used: Most recent authentication with this passkey
  • Remove: Revoke this passkey

Operations:

  • Remove Passkey: Click remove icon to revoke
  • User can no longer authenticate with that device
  • Use case: Lost device, security incident

Security recommendations:

  • Encourage users to register multiple passkeys (backup devices)
  • Remove passkeys for lost or stolen devices immediately
  • Passkeys are phishing-resistant (prefer over TOTP when possible)
  • Monitor for suspicious passkey registrations

SSH Keys Tab

Purpose: Manage SSH public keys for terminal/CLI access.

Availability: Only visible if SSH access features are enabled.

SSH Key Management

  • View Registered Keys: User's SSH public keys
  • Add SSH Key: Register new public key
  • Remove SSH Key: Revoke access

Operations:

  • Add SSH Key:
  • Paste SSH public key (PEM format)
  • Assign descriptive name
  • Set expiration (optional)
  • Remove SSH Key: Revoke access for that key

Security recommendations:

  • Rotate SSH keys regularly (every 6-12 months)
  • Remove keys for former employees immediately
  • Use separate keys for different access levels
  • Set expiration dates for temporary access
  • Monitor SSH key usage in audit logs

User Group Management Reference

When creating or editing a user group via User Groups > Settings icon, you'll encounter a multi-tab configuration dialog.

Creating a User Group

Prerequisites:

  • Appropriate permissions: auth.groups.create or tenant admin

Process:

  1. Click + ADD GROUP from User Groups dashboard
  2. Fill in group details across tabs
  3. Click Save

Group Settings Tab

Purpose: Core group properties and configuration.

Group Identity

  • Name* (required)
  • Unique identifier for the group
  • Maximum 50 characters
  • Must contain at least one letter
  • Naming convention: Use descriptive names (e.g., "engineering-team", "read-only-users")

  • Description

  • Detailed explanation of group purpose
  • Maximum 200 characters
  • Best practice: Document who should be in this group and what access it grants

Group Properties

  • Is Privileged
  • Toggle to mark group as privileged
  • Privileged groups may have elevated permissions or bypass certain restrictions
  • Security warning: Use sparingly; reserved for admin or elevated-access groups
  • Use case: Admin groups, operator groups, elevated support access

  • Allow Membership Extension Requests

  • Toggle to enable users to request extended membership
  • When enabled, users can request to extend their group membership
  • Use case: Time-limited project teams, temporary access groups

  • Namespace

  • Logical isolation boundary for the group
  • Selector dropdown lists available namespaces
  • Required: Must select a namespace (no null option)
  • Use case: Separate groups by environment (prod/dev) or department

Security recommendations:

  • Use clear naming conventions for groups
  • Document group purpose in description
  • Only mark groups as privileged when necessary
  • Use namespaces to enforce isolation

Members Tab

Purpose: Manage user membership in the group.

Member Management

  • Current Members: Paginated table of group members
  • Displays name, email, issuer, member since
  • Supports filtering by email
  • Lazy loading for large groups (handles thousands of members)

  • Add Members:

  • Autocomplete search for users
  • Type email to search across all tenant users
  • Displays email and issuer for each match
  • Click Add to assign user to group
  • Users immediately inherit group's roles and permissions

  • Remove Members:

  • Click remove icon next to user
  • User loses group-based roles and permissions
  • Does not delete the user account

Member table columns:

  • Name: User's full name
  • Email: User's email address
  • Identity Issuer: Authentication provider
  • Member Since: Date added to group
  • Expiration: Membership expiration date (if set)
  • Remove: Remove from group
  • Filter by Email: Real-time search across members
  • Pagination: Configurable rows per page (10-1000)
  • Sort: Click column headers to sort

Best practices:

  • Review group membership quarterly
  • Remove users who no longer need access
  • Use descriptive search to find members quickly
  • Set expiration dates for temporary access

Client Roles Tab

Purpose: Assign application-level roles to all group members.

Managing Client Roles

  • Current Roles: Table of roles assigned to this group
  • Add Roles:
  • Autocomplete search for available app roles
  • Select role and click Add
  • All group members inherit this role
  • Remove Roles:
  • Click remove icon next to role
  • All group members lose this role

Role columns:

  • Role Name: Role identifier
  • Client: Application this role belongs to
  • Description: Role purpose
  • Permissions: Number of permissions in role
  • Remove: Unassign role from group

Use case: Grant "editor" role in "Document Management App" to entire "editors" group.

Security benefit: When you add a user to the group, they automatically get all group roles without additional configuration.


API Roles Tab

Purpose: Assign API-specific roles to all group members.

Managing API Roles

  • Current API Roles: Table of API-specific roles assigned to this group
  • Add API Roles:
  • Autocomplete search for available API roles
  • Select role and click Add
  • All group members inherit this API role
  • Remove API Roles:
  • Click remove icon next to role
  • All group members lose this API role

API Role columns:

  • Role Name: Role identifier
  • API: Resource server this role belongs to
  • Description: Role purpose
  • Permissions: API permissions in role
  • Remove: Unassign role from group

Use case: Grant "api:orders:admin" role in "Order Management API" to entire "order-managers" group.

Security benefit: API access is controlled at group level; adding/removing users is simple.


UMRS Grants Tab

Purpose: Assign User-Managed Role System (UMRS) grants to the group.

Note: UMRS is an advanced feature for delegated role management. This tab may not be visible if UMRS is not configured for your tenant.

What is UMRS?

UMRS (User-Managed Role System) allows designated users to grant/revoke specific roles without being full admins. It's useful for:

  • Project leads managing project access
  • Team managers controlling team resources
  • Delegated administration

Managing UMRS Grants

  • Current UMRS Grants: Roles this group can grant to others
  • Add UMRS Grant:
  • Select UMRS role
  • Grant permission to assign that role
  • Group members can now grant this role to other users
  • Remove UMRS Grant:
  • Revoke delegation permission
  • Group members can no longer grant that role

Security warning: UMRS grants are powerful. Only assign to trusted groups/users who need delegation capabilities.


Security Best Practices

User Management Security

  1. Follow least privilege
  2. Grant minimum permissions required for job function
  3. Review and revoke unused permissions regularly
  4. Use time-limited access for temporary needs

  5. Use group-based access control

  6. Assign permissions to groups, not individual users
  7. Easier to audit and maintain
  8. Reduces error-prone individual assignments

  9. Implement strong authentication

  10. Prefer passkeys (WebAuthn) over TOTP when possible
  11. Require MFA for admin and privileged groups
  12. Enforce MFA for sensitive applications

  13. Set appropriate expirations

  14. Use user expiration for contractors, temps, trials
  15. Set group membership expiration for project-based access
  16. Monitor and clean up expired accounts regularly

  17. Audit access regularly

  18. Review user roles and permissions quarterly
  19. Check group memberships for accuracy
  20. Use Assigned Roles/Permissions views for audits
  21. Remove unused accounts promptly

Group Management Security

  1. Define clear group purposes
  2. Document what each group is for
  3. Use descriptive names
  4. Avoid overlapping group responsibilities

  5. Limit privileged groups

  6. Only mark groups as privileged when truly necessary
  7. Audit privileged group membership frequently
  8. Require justification for privileged group access

  9. Use namespaces for isolation

  10. Separate production from non-production
  11. Isolate departments or projects
  12. Enforce namespace boundaries strictly

  13. Control group membership

  14. Require approvals for sensitive group additions
  15. Monitor group membership changes in audit logs
  16. Set up alerts for privileged group modifications

  17. Review role assignments

  18. Ensure groups have only necessary roles
  19. Remove unused role assignments
  20. Document why each role is assigned

Administrative Best Practices

  1. Separation of duties
  2. Don't use your admin account for daily tasks
  3. Have separate admin and user accounts
  4. Require multiple approvals for sensitive changes

  5. Change management

  6. Test permission changes in non-production first
  7. Document all privilege escalations
  8. Have rollback plans for group/role changes

  9. Monitoring and alerting

  10. Alert on privileged group membership changes
  11. Monitor failed authentication attempts
  12. Track bulk user imports/deletions
  13. Review event logs for suspicious patterns

  14. Data protection

  15. Don't store sensitive data in user profiles
  16. Encrypt PII appropriately
  17. Comply with data retention policies
  18. Have user data export/deletion procedures (GDPR)

  19. Access reviews

  20. Quarterly access reviews for all users
  21. Immediate review when users change roles
  22. Annual comprehensive privilege audit
  23. Remove access for terminated employees immediately

Additional Resources

  • License Management Guide: packages/auth/docs/guides/license-management-guide.md (super admins)
  • Tenant Administrator Guide: packages/auth/docs/guides/tenant-admin-guide.md
  • SSO Integration Guide: packages/auth/docs/guides/sso-integration-guide.md
  • Super Admin Access Reference: packages/auth/docs/authorization/super-admin-access.md
  • Admin Roles Overview: packages/auth/docs/authorization/admin-roles.md
  • Auth API Documentation: Available via Help > Auth API Documentation in the UI

Getting Help

For assistance with user and group management:

  1. Check event logs for authentication/authorization failures
  2. Review Assigned Roles/Permissions views for access issues
  3. Test in non-production before making bulk changes
  4. Contact super administrator for license or elevated privilege requests
  5. Consult audit logs for historical changes and troubleshooting

Document version: 1.1
Last updated: 2025-12-12
Target audience: Tenant Administrators
Note: System administrators should also refer to the License Management Guide