Overview
User Management provides centralized control over who can access MicroCBM and what they can do. Users are assigned to organizations and sites, with role-based permissions determining their capabilities.User access follows the organizational hierarchy: users can only access data within their assigned organization and site(s).
User Attributes
Each user account includes: Personal Information:- First Name and Last Name
- Email: Used for login and notifications
- Phone: Contact number in international format
- Country: User’s country
- Date of Birth: Optional demographic info
- Organization: Which company the user belongs to
- Site: Primary work location
- Role: Defines permissions (SuperAdmin, Admin, Operator, etc.)
- Active: User can log in and use the system
- Inactive: User is disabled but account retained
- Pending: User invited but hasn’t completed registration
Creating a New User
Enter Personal Details
Fill in user information:
- First Name: User’s given name
- Last Name: User’s family name
- Email: Must be unique, used for login
- Phone: Include country code (e.g., +1 555-123-4567)
- Country: Select from dropdown
- Date of Birth: Optional
Assign Organization and Site
Link the user to their work location:
- Organization: Select the company (SuperAdmin only)
- Site: Choose the facility where they work
The site dropdown filters based on the selected organization.
Select Role
Choose the appropriate permission level:
- SuperAdmin: Full system access (typically service provider admins)
- Admin: Organization-wide access
- Maintenance Manager: Site maintenance oversight
- Operator: Day-to-day operations, limited editing
- Viewer: Read-only access
Set Initial Status
- Active: User can log in immediately
- Pending: User receives invitation email to complete registration
- Inactive: Account created but disabled
Roles and Permissions
MicroCBM uses role-based access control (RBAC) with granular permissions.Permission Structure
Permissions follow the pattern:resource:action
Examples:
assets:create— Can create new assetsalarms:acknowledge— Can acknowledge alarmsrecommendations:delete— Can delete recommendationsusers:read— Can view user list
Built-In Roles
- SuperAdmin
- Admin
- Maintenance Manager
- Operator
- Viewer
Full system access across all organizations and sites.Capabilities:
- Create/edit/delete organizations
- Manage all sites across all organizations
- Create/edit/delete users in any organization
- View all assets, alarms, recommendations, and samples
- Manage roles and permissions
- Access system settings
Custom Roles
Administrators can create custom roles with specific permission combinations:- Navigate to Roles (under User Management)
- Click Add New Role
- Name the role (e.g., “Quality Inspector”)
- Select permissions by resource and action
- Save the role
Editing Users
Update Fields
Modify any user attributes:
- Personal information
- Organization or site assignment
- Role
- Status (Active/Inactive/Pending)
When changing a user’s organization, their site is automatically cleared since sites belong to specific organizations.
Managing User Status
Activating Users
Change status from “Pending” or “Inactive” to “Active”:- Edit the user
- Set Status to Active
- Save
Deactivating Users
To deactivate:- Edit the user
- Set Status to Inactive
- Save
- Employee on extended leave
- Contractor whose project ended
- Former employee (retain records, prevent access)
Pending Users
Users with “Pending” status have been created but haven’t completed registration:- They receive an invitation email with a registration link
- They set their own password during registration
- Status automatically changes to “Active” upon completion
Viewing User Details
Click on any user to see their profile:- Personal Information: Name, email, phone, country
- Organization & Site: Current assignments
- Role: Permission level
- Status: Active, Inactive, or Pending
- Account History: Created date, last updated
- Activity: Recent logins, actions performed (if auditing enabled)
Filtering and Searching Users
Use the filter panel to find users:- Search: Name, email, or phone number
- Organization: Filter by company (SuperAdmin only)
- Site: Filter by location
- Role: Filter by permission level
- Status: Active, Inactive, or Pending
Bulk User Operations
Import Users (CSV)
Import multiple users at once:- Download the CSV template
- Fill in user information (one user per row)
- Upload the CSV file
- Review import preview
- Confirm import
Export Users
Export user list to CSV for:- Backup
- Analysis in Excel
- Integration with other systems
- Apply filters (if needed)
- Click Export
- Choose CSV or Excel format
- Download file
Password Management
User Password Reset
Users who forget their password:- Click Forgot Password on the login page
- Enter their email address
- Receive password reset link via email
- Set new password
Admin Password Reset
Administrators can reset passwords for users:- Edit the user
- Click Reset Password
- Temporary password is emailed to the user
- User must change password on next login
Security Best Practices
Principle of Least Privilege
Assign the minimum role needed for each user’s job. Don’t give everyone Admin access.
Regular Access Reviews
Quarterly, review user list and deactivate accounts no longer needed.
Strong Password Policy
Require minimum 8 characters, mix of upper/lower/numbers/symbols.
Multi-Factor Authentication
Enable MFA for Admin and SuperAdmin accounts (if supported).
Password Requirements
MicroCBM enforces:- Minimum 8 characters
- At least one uppercase letter
- At least one lowercase letter
- At least one number
- At least one special character
- Cannot reuse last 3 passwords
- Must change every 90 days (configurable)
Deleting Users
To delete:- Click Delete next to the user
- Confirm in the dialog
- User is immediately logged out if active
- Duplicate accounts created by mistake
- Test accounts in production (avoid this!)
- Former employees: Deactivate instead to preserve audit trail
- Contractors between projects: Deactivate and reactivate when they return
User Activity Auditing
Track what users do in the system:- Login History: When users logged in/out
- Action Logs: Changes made to assets, alarms, recommendations
- Export History: What reports were downloaded
Audit logs are typically retained for compliance and troubleshooting. Retention period varies by deployment.
Related Features
- Organizations & Sites: Users are assigned to organizational entities
- Asset Management: Assets have assignees (users)
- Recommendations: Recommendations have recommenders (users)
- Root Cause Analysis: RCA leaders and team members are users