Skip to main content

User Management Overview

Overview

The User Management system in ASCEND provides comprehensive tools for managing the complete user lifecycle within your organization. Administrators can invite users, assign roles, monitor activity, and manage access controls with enterprise-grade security and full audit trail capabilities.

User management is critical for maintaining security posture and ensuring compliance with regulations like SOC 2, HIPAA, and PCI-DSS that require strict access control and accountability.

Prerequisites

  • org_admin, Admin, or Super_Admin role
  • Access to the Admin Console
  • Available user seats (check your subscription limits)

Key Concepts

User States

Users in ASCEND can exist in one of four states:

StateDescriptionIconCan Login
ActiveNormal operational stateGreen badgeYes
PendingInvited but never logged inGray badgeYes (first login)
SuspendedTemporarily disabledOrange badgeNo
DeactivatedSoft-deleted from organizationRed badgeNo

User Lifecycle

Invite --> Pending --> Active --> (Suspended) --> Deactivated
^ |
|_____________| (Reactivate)
  1. Invite: Administrator sends invitation
  2. Pending: User receives email, has not logged in
  3. Active: User has completed first login
  4. Suspended: Temporarily blocked (reversible)
  5. Deactivated: Removed from organization (soft delete)

Step-by-Step Guide

Viewing Users

  1. Navigate to Admin Console
  2. Click the "Users" tab
  3. View the user table with columns:
    • User (avatar, name)
    • Email
    • Role
    • Status
    • Last Active
    • Actions

Filtering and Searching

  1. Use the search box to filter by name or email
  2. Filter by status using the dropdown
  3. Click column headers to sort

Inviting a New User

  1. Click "+ Invite User" button
  2. Enter required information:
    • Email address
    • First name
    • Last name
  3. Select role from dropdown:
    • Viewer
    • Analyst
    • Admin
    • Organization Admin
  4. Click "Send Invitation"
  5. User receives welcome email with temporary password

Managing Individual Users

Click the three-dot menu on any user row to access:

ActionDescription
Edit ProfileUpdate user's personal information
View ActivitySee audit log of user's actions
Suspend/ReactivateTemporarily disable or re-enable access
Reset PasswordSend password reset email
Force LogoutImmediately terminate all sessions
Remove UserPermanently remove from organization

Bulk Operations

For managing multiple users simultaneously:

  1. Select users using row checkboxes
  2. Bulk action bar appears at top
  3. Choose operation:
    • Suspend all selected
    • Reactivate all selected
    • Change role for all selected
    • Delete all selected
  4. Provide reason (for audit trail)
  5. Confirm action

Configuration Options

OptionDescriptionDefault
include_inactiveShow deactivated users in listfalse
User LimitMaximum users per subscription tierTier-dependent
Invitation ExpiryHow long invitation links remain valid7 days
Password PolicyMinimum password requirementsCognito default

User Attributes

Core Attributes

AttributeDescriptionEditable
emailUser's email addressYes (triggers verification)
first_nameGiven nameYes
last_nameFamily nameYes
roleAccess roleYes (by admin)
is_org_adminOrganization admin flagYes (by admin)

Extended Attributes

AttributeDescriptionEditable
phonePhone numberYes
departmentOrganizational unitYes
job_titlePosition/titleYes
approval_levelRBAC access level (0-5)Yes (by admin)

System Attributes (Read-Only)

AttributeDescription
idUnique user identifier
created_atAccount creation timestamp
last_loginMost recent login timestamp
cognito_user_idAWS Cognito identifier
token_versionSession invalidation counter

User Actions Reference

Edit Profile

Updates user personal information:

  • Name changes take effect immediately
  • Email changes require re-verification
  • Changes are logged in audit trail

View Activity

Displays user's audit history:

  • Actions performed by the user
  • Actions performed on the user
  • Includes timestamps and IP addresses
  • Filterable and exportable

Suspend User

Temporarily blocks access:

  • User cannot log in
  • Existing sessions remain valid until token expires
  • Can be reactivated without data loss
  • Requires reason for compliance

Reactivate User

Restores suspended user:

  • Access immediately restored
  • User can log in with existing credentials
  • Activity logged with reason

Reset Password

Triggers password reset flow:

  • Cognito sends reset email to user
  • User must set new password
  • All existing sessions remain valid
  • Consider combining with Force Logout for security incidents

Force Logout

Immediately terminates all sessions:

  • Invalidates all active tokens
  • Cognito global sign-out
  • User must re-authenticate
  • Use for security incidents or device loss

Remove User

Permanently removes from organization:

  • Soft delete (is_active = false)
  • User cannot log in
  • Data retained for audit purposes
  • Cognito user not deleted (can be recovered)

API Reference

List Users

GET /api/admin/users?include_inactive=false
Authorization: Bearer <token>

Invite User

POST /api/admin/users/invite
Authorization: Bearer <token>
X-CSRF-Token: <csrf_token>
Content-Type: application/json

{
"email": "new.user@company.com",
"first_name": "New",
"last_name": "User",
"role": "analyst"
}

Update User Role

PATCH /api/admin/users/{user_id}/role
Authorization: Bearer <token>
X-CSRF-Token: <csrf_token>
Content-Type: application/json

{
"role": "admin",
"is_org_admin": false
}

Suspend User

PATCH /api/admin/users/{user_id}/suspend
Authorization: Bearer <token>
X-CSRF-Token: <csrf_token>
Content-Type: application/json

{
"suspended": true,
"reason": "Policy violation - pending review"
}

Best Practices

  1. Onboarding Process

    • Invite users before their start date
    • Assign appropriate role based on job function
    • Verify users complete MFA setup
  2. Offboarding Process

    • Immediately suspend upon termination notice
    • Force logout all sessions
    • Review and reassign ownership of resources
    • Deactivate account after transition period
  3. Regular Audits

    • Review user list monthly
    • Verify role assignments quarterly
    • Export and archive audit logs
    • Remove stale pending invitations
  4. Security Incident Response

    • Force logout affected users immediately
    • Suspend if compromise is suspected
    • Reset password after investigation
    • Review activity logs for unauthorized access
  5. Principle of Least Privilege

    • Assign minimum necessary role
    • Upgrade access only when justified
    • Document role assignment decisions
    • Regularly review elevated privileges

Compliance Mapping

RequirementStandardImplementation
Access provisioningSOC 2 CC6.2User invitation workflow
Access revocationSOC 2 CC6.3Deactivation and force logout
Unique identificationHIPAA 164.312(a)(2)(i)Unique user IDs
Automatic logoffHIPAA 164.312(a)(2)(iii)Session timeout and force logout
User access reviewPCI-DSS 8.1.4Activity logs and bulk operations
Account managementNIST AC-2Full lifecycle management