Network Users
The Network Users interface serves as your central hub for managing all user accounts across your entire network infrastructure. This powerful tool enables you to create new users, assign them to specific network members, control their roles and permissions, and track their system activity—all from one convenient location.
Navigate to System Admin > Network > Users to access the network user management interface.
Access Requirements
Network user management requires elevated system privileges. You must hold one of these administrative roles:
- System Administrator - Complete network user management authority
- Network Administrator - Network-wide user administration capabilities
Learn more: User Management Permissions
Creating Network Users
Add New User
Creating network users is a straightforward process that establishes immediate system access for new team members.
- Click the button located next to the Users header
- Fill in the required user information:
- Full Name - The display name that appears throughout the system
- Email - Serves as the login username and contact address
- Password - Enter a specific password or leave blank for automatic generation
- Network Member - Choose which member account this user will access
- Role - Select the appropriate permission level for their responsibilities
- Configure optional settings as needed:
- Restricted - Prevents login while maintaining the account for future use
- User Interface Profile - Applies custom visibility settings to specific UI elements
- Click Create User to finalize the account setup
Post-Creation Process
Once you create a new user account, several automated processes take place:
- If you chose automatic password generation, the system sends login credentials via email
- A user license is automatically allocated from your available network pool
- The new user gains immediate access to their designated member account
- Their account becomes visible in the network users list for ongoing management
Learn more: Network Members
User Roles and Permissions
Available Roles
Understanding the different permission levels helps you assign appropriate access to each user based on their responsibilities.
Role | Access Level | Typical Use Case |
---|---|---|
View Only | Read-only access to content and schedules | Stakeholders, reviewers |
Content Editor | Create and modify content (requires approval to publish) | Content creators |
Content Manager | Full content control including publishing | Content team leads |
Technical Manager | Device and system configuration | IT staff |
Administrator | Complete system access | System administrators |
Changing User Roles
Modifying user permissions is quick and takes effect immediately across the system.
- Find the user in your network users list
- Click the Edit button (pencil icon) next to their name
- Choose the new role from the dropdown menu
- Click Save Changes to apply the update
Role modifications become active instantly. However, users may need to refresh their browser or log back in to access their new permissions.
User Interface Profiles
In addition to standard role-based permissions, you can fine-tune the user experience by controlling which interface elements each user can see.
- Click User Interface Profile Settings for the desired user
- Customize visibility settings for specific features and menu items
- Save your changes to implement the custom interface restrictions
Learn more: User Interface Profile Settings
Managing Existing Users
Edit User Information
Updating user accounts allows you to maintain current information and adjust access as roles and responsibilities change.
- Locate the user in your network users list
- Click the Edit button (pencil icon) beside their entry
- Modify any of the available fields:
- Name and Email - Update user identification information
- Password - Reset by entering a new password or clear the field for automatic generation
- Network Member - Transfer the user to a different member account
- Role - Adjust their permission level as needed
- Status - Toggle between active and restricted access
- Click Save Changes to confirm your updates
When handling password resets:
- Manual entry: You must notify the user of their new password separately
- Auto-generation: The system automatically emails new credentials to the user
For member-level user management, learn more: Settings - Users
Remove Users
When user accounts are no longer needed, you can permanently remove them from the system.
- Find the user in your network users list
- Click the Remove button (trash icon) next to their name
- Confirm the deletion in the confirmation dialog
Important considerations when removing users:
- All content they created remains in the system unchanged
- Content ownership must be manually reassigned to other users
- Consider using account restriction instead of deletion to maintain complete audit trails
Restrict User Access
Rather than permanent deletion, you can temporarily disable user access while preserving their account and associated data.
- Click Edit for the target user
- Check the Restricted option
- Save your changes
Restricted accounts have the following characteristics:
- Users cannot log in through any authentication method
- Any active sessions terminate immediately upon restriction
- All account information and audit data remain preserved
- Accounts can be easily reactivated when access is needed again
User Activity Monitoring
Comprehensive user activity tracking provides valuable insights for security audits, system optimization, and operational oversight across your entire network.
Activity Tracking
The system continuously monitors and records several key areas of user engagement:
- Login Activity - Tracks last access times and login frequency patterns
- Content Operations - Records all creation, editing, and publishing actions
- System Usage - Analyzes feature utilization patterns and user behavior
- Security Events - Logs failed login attempts and permission violations
Best Practices
Effective user activity monitoring helps maintain a secure and efficient system:
- Conduct regular reviews of user activity for security compliance
- Identify inactive accounts that may need deactivation or removal
- Monitor for unusual access patterns that could indicate security concerns
- Leverage activity data to optimize role assignments and improve user experience
If you need assistance with user management or have questions about setting up user roles and permissions, please contact our support team at support@wallboard.info