Skip to main content

People - system users

This section can be found under Features—People. Here, you can add people who can log in to the system. You can change their access control type, such as simple user or administrator.

Click new on the right-hand side to add a new user/person.

image.png

Complete all the boxes as required.

You must complete somethe mandatory boxes before you can save the new person.

image.png

ThisThe User name will be used as the portal login name and must be unique. Setting a simple name like John will not be allowed, as there could already be a John on the system. We recommend using the person's email address, which will likely be unique.

image.png

This must also be completed as it is used for password recovery and voicemail to email if the user/person is set as a mailbox owner.

image.png

Finally, the password must match and contain at least ten characters. This can be alphanumeric or any special character.

Security

To tryenhance security and eliminateprevent fraud andfrom peopleunauthorised logginglogins, inwe when they shouldn't.

We haveoffer two security methodsmethods.

that can be used.


1,  

image.png
ThisThe willfirst sendmethod thesends useran email containing a One-Time Password (OTP) to users logging in with their password an email with an OTP (one-time password).password. Once thisyou enter the 6-digit PIN is entered,PIN, the system and your computer will remember who you are and will notwon’t require you to log in again using theuse OTP authentication again until you havelog logged out again.out.
This example shows a key. These are the users with the Multi-factorFactor authentication enabled.

image.png

2,

image.png

ThisThe willsecond onlymethod allowrestricts this userlogins to log in from the listedspecific IP addresses. ThisWhile isn'tthis socan goodenhance security, it may not be ideal for users who frequently access the portal from mobile devices, as peoplethese maycan be logging in using their mobile phones, which will useutilise multiple IP addresses from the mobile networknetwork. poolThis of IP addresses. Itmethod is probablymost onlyeffective valid if you knowwhen the useruser's login willis only be dedicatedconfined to a singlesingle, dedicated IP address.