© 2021 Outpost24® All rights reserved. This document may only be redistributed unedited and unaltered. This document may be cited and referenced only if clearly crediting Outpost24® and this document as the source. Any other reproduction and redistribution in print or electronically is strictly prohibited without explicit permission.
Outpost24® and OUTSCAN™ are trademarks of Outpost24® in Sweden and other countries.
This document describes how to create a user on HIAB/OUTSCAN.
The Manage Users module allows for viewing and editing of all the users that you are allowed to administer in the system. As the main user you can add and manage more users as well as create and assign user roles.
User Roles need to be created before the user to be available for selection.
See User Roles for more information on how to create roles.
Create a User
To create a user:
- Click Main Menu > Settings > Manage User.
In the Manage User Accounts window select User Accounts tab.
The buttons at the top center of the screen ids used to create, delete, or import users from LDAP/AD.
- Click + New to create a user.
In the Maintaining User Account window, fill in the Account Details and Login Details.
In the grid on the lower half of Maintaining User Account window, the account access and rights can be further set up in the different tabs. Note that the tabs differs depending on your license.
Sets the parent account, could be used to create hierarchy structures.
The first name of the user.
The last name of the user.
The email address of the user.
The mobile number of the user.
The country of the user.
The state of the user (Active if Country is United States).
Email PGP public key
Select PGP public key or click the + sign to upload a PGP key.
- [uploaded keys]
Choose if the user credentials should be verified against the local database or the defined LDAP or Active Directory server.
Enter a username.
Enter a password, or generate a password using the password button. Passwords are generated according to the password policy located in the Security Policy tab under Main Menu > Settings > Account.
See section Password Policy in Account Settings document for information on how to set password policies.
Password again Confirm the password by re-typing in this field.
Require password change on next logon
If enabled, forces the user to change his/her password the next time they log in to the system.
If enabled, you may set up the mode of authentication from here. Mobile Security Code or Google Authenticator can be used for authentication. The method used for authentication can be limited, depending on the options configured for two factor authentications in the security policy.
When Google authentication is selected, you will be asked to enter the credential ID which is used to set up the account.
In Account Settings tab you can deactivate an account and set the users notification.
Option Description Active
Activate or deactivate account.
Super User A user with Super User enabled will have the same rights as the main account (which is unrestricted). Receive System Notifications When Super User is active, the user can receive system notifications, or have it deactivated. Allow Enroll HIAB Allow the user to enroll HIABs. Send Informative Email
If Send Informative Email is activated, then the system will send an email to the sub user when their account has been changed.
Escalate tickets to The Escalate tickets to drop down menu allow you to define who should receive any tickets which has not been resolved prior to its due date (which were assigned to this specific user).
Assign the user with one or more Granted User Roles otherwise the user will not be allowed to perform any actions in the system.
For more information on how to create user roles, see User Roles.
In the Granted Targets tab, you can define which targets and scanners (if enabled) the user should have access to.
- Not all Targets Granted limits the target groups and targets a user can see and administrate. The target list feature should be used sparsely since it create an overhead when it comes to administrative task in the long run. The only time you should use this feature is when you would like to grant access to a whole IP range without having to define all targets within the system.
- Granted Scanners limits which scanners the user has access to within the system. If All Scanners is selected then the user will also automatically have access to scanners which are added afterwards.
- Once the user has been set up, click Save.