User Settings is an area in a system where users can adjust personal preferences, account settings, and security settings. Typically, user settings include options such as password changes, profile information, notification preferences, and possibly individual permissions to access certain features or data.

In most organizations, only authorized people have access to user settings, usually administrators or system administrators. This is because the settings may contain sensitive information that could compromise the security of the system if changed by unauthorized persons. Administrators are able to manage user settings to ensure that they comply with organizational policies and requirements and that the integrity of the system is maintained.

  1. Search Bar: Allows administrators to quickly find users by searching for their names or other details.

  2. User List: Displays a list of users with the following columns:

    • Name: The full name of the user.

    • Email: The user's email address, which is likely used as their login identifier.

    • Admin: A checkbox indicating whether the user has administrative privileges. Admins typically have access to all settings and can manage other user accounts.

    • Actions: This column typically includes buttons or links for performing actions such as editing user details, resetting passwords, or deleting the user account.

  3. Add User Button: This button is used to create new user accounts. Clicking on it would typically bring up a form where you can enter the new user's details, such as their name, email, and whether they should have admin rights.

Step-by-step instructions to add a new user:

  • Access User Management: Navigate to Settings - Global Settings - Groups, User and Permissions - User, where you can add new users.

  • Add new user: In the user settings, click on โ€œAdd userโ€

  • Filling out the form: A form will appear where you can enter the information for the new user. Typical information includes:

  • Username: Unique name for the user used to log in.

  • First Name and Last Name: Name of the user.

  • Email Address: The user's email address used for communications and notifications.

  • Password: A password for the user that should comply with security policies.

  • User Role: Set the user's role, e.g. B. Standard user or administrator.

Last updated