Skip to main content

Network Users

The Network Users interface serves as your central hub for managing all user accounts across your entire network infrastructure. This powerful tool enables you to create new users, assign them to specific network members, control their roles and permissions, and track their system activity—all from one convenient location.

Navigate to System Admin > Network > Users to access the network user management interface.

Access Requirements

Network user management requires elevated system privileges. You must hold one of these administrative roles:

  • System Administrator - Complete network user management authority
  • Network Administrator - Network-wide user administration capabilities

Learn more: User Management Permissions

Creating Network Users

Add New User

Creating network users is a straightforward process that establishes immediate system access for new team members.

  1. Click the button located next to the Users header
  2. Fill in the required user information:
    • Full Name - The display name that appears throughout the system
    • Email - Serves as the login username and contact address
    • Password - Enter a specific password or leave blank for automatic generation
    • Network Member - Choose which member account this user will access
    • Role - Select the appropriate permission level for their responsibilities
  3. Configure optional settings as needed:
    • Restricted - Prevents login while maintaining the account for future use
    • User Interface Profile - Applies custom visibility settings to specific UI elements
  4. Click Create User to finalize the account setup

Post-Creation Process

Once you create a new user account, several automated processes take place:

  • If you chose automatic password generation, the system sends login credentials via email
  • A user license is automatically allocated from your available network pool
  • The new user gains immediate access to their designated member account
  • Their account becomes visible in the network users list for ongoing management

Learn more: Network Members

User Roles and Permissions

Available Roles

Understanding the different permission levels helps you assign appropriate access to each user based on their responsibilities.

RoleAccess LevelTypical Use Case
View OnlyRead-only access to content and schedulesStakeholders, reviewers
Content EditorCreate and modify content (requires approval to publish)Content creators
Content ManagerFull content control including publishingContent team leads
Technical ManagerDevice and system configurationIT staff
AdministratorComplete system accessSystem administrators

Changing User Roles

Modifying user permissions is quick and takes effect immediately across the system.

  1. Find the user in your network users list
  2. Click the Edit button (pencil icon) next to their name
  3. Choose the new role from the dropdown menu
  4. Click Save Changes to apply the update

Role modifications become active instantly. However, users may need to refresh their browser or log back in to access their new permissions.

User Interface Profiles

In addition to standard role-based permissions, you can fine-tune the user experience by controlling which interface elements each user can see.

  1. Click User Interface Profile Settings for the desired user
  2. Customize visibility settings for specific features and menu items
  3. Save your changes to implement the custom interface restrictions

Learn more: User Interface Profile Settings

Managing Existing Users

Edit User Information

Updating user accounts allows you to maintain current information and adjust access as roles and responsibilities change.

  1. Locate the user in your network users list
  2. Click the Edit button (pencil icon) beside their entry
  3. Modify any of the available fields:
    • Name and Email - Update user identification information
    • Password - Reset by entering a new password or clear the field for automatic generation
    • Network Member - Transfer the user to a different member account
    • Role - Adjust their permission level as needed
    • Status - Toggle between active and restricted access
  4. Click Save Changes to confirm your updates
Password Resets

When handling password resets:

  • Manual entry: You must notify the user of their new password separately
  • Auto-generation: The system automatically emails new credentials to the user

For member-level user management, learn more: Settings - Users

Remove Users

When user accounts are no longer needed, you can permanently remove them from the system.

  1. Find the user in your network users list
  2. Click the Remove button (trash icon) next to their name
  3. Confirm the deletion in the confirmation dialog
Content Ownership

Important considerations when removing users:

  • All content they created remains in the system unchanged
  • Content ownership must be manually reassigned to other users
  • Consider using account restriction instead of deletion to maintain complete audit trails

Restrict User Access

Rather than permanent deletion, you can temporarily disable user access while preserving their account and associated data.

  1. Click Edit for the target user
  2. Check the Restricted option
  3. Save your changes

Restricted accounts have the following characteristics:

  • Users cannot log in through any authentication method
  • Any active sessions terminate immediately upon restriction
  • All account information and audit data remain preserved
  • Accounts can be easily reactivated when access is needed again

User Activity Monitoring

Comprehensive user activity tracking provides valuable insights for security audits, system optimization, and operational oversight across your entire network.

Activity Tracking

The system continuously monitors and records several key areas of user engagement:

  • Login Activity - Tracks last access times and login frequency patterns
  • Content Operations - Records all creation, editing, and publishing actions
  • System Usage - Analyzes feature utilization patterns and user behavior
  • Security Events - Logs failed login attempts and permission violations

Best Practices

Effective user activity monitoring helps maintain a secure and efficient system:

  • Conduct regular reviews of user activity for security compliance
  • Identify inactive accounts that may need deactivation or removal
  • Monitor for unusual access patterns that could indicate security concerns
  • Leverage activity data to optimize role assignments and improve user experience
SUPPORT

If you need assistance with user management or have questions about setting up user roles and permissions, please contact our support team at support@wallboard.info