👤 User Management

 Operation Title: User Management

 Over view: Defines User Access and Responsibilities

Key Features:

List of Figures:

Overview:

User management roles define the access levels and responsibilities assigned to individuals within a system. These roles determine what actions users can perform, such as creating, editing, or viewing data, and help enforce security, accountability, and proper workflow control. By assigning roles like admin, editor, or viewer, the system ensures users have the appropriate permissions based on their duties, reducing errors and enhancing overall efficiency.

Introduction:

User Management Roles are a fundamental part of access control within any application or system. They define what each user is permitted to do based on their responsibilities such as managing data, performing administrative tasks, or simply viewing content. Assigning roles helps maintain security, structure user interactions, and streamline system operations by ensuring that each user only accesses the features and information relevant to their role.

⚙️ Functionality
Figure: 15.1
  • 1 Search Bar: Users can search for specific files by entering text like a case ID or filename. This makes it easier to quickly find the needed file without browsing through the whole list.
🔧 How to use the User management form?
NOTE: Before open the roles management form, users must select the region from navbar
Figure: 15.2
Figure: 15.3

ADD User: This function allows administrators to create a new user profile within the system. In the pop-up, the user can enter details such as name, email and password. This ensures that the right individuals are granted access with the appropriate level of control based on their responsibilities.

Figure: 15.4

In this pop-up, the user can select one or more roles they want to assign to the new user. This helps define the user's access level and permissions, ensuring they can perform only the actions relevant to their responsibilities within the system.

          ➤ Here User may select the roles

Figure: 15.5
📊 User Management Records Table
  • 1 User Management Records table:
  • Name: Displays the name of the user for easy identification within the system.
  • Email: Displays the user's registered email address for communication and identification.
  • Phone Nbr: Displays the user's contact number for communication purposes.
  • Role: Lists the roles assigned to the user, defining their access level and permissions within the system.
  • Status: This Indicates whether the user account is Active, Inactive, or Pending.
Figure: 15.6
Figure: 15.7

Actions:

This section allows the user to perform key management tasks such as editing user details, deleting user accounts, and disabling users temporarily. These options provide flexibility in maintaining accurate user records and controlling access as needed for security and operational efficiency.

Edit User: Update profile details and change password. Then click on the Next button.

Figure: 15.8

➤ Allows the administrator to assign one or more roles to the user, defining their permissions and access levels within the system.

Figure: 15.9
Figure: 15.10

Info: In this section, users can view detailed information about a selected user, including their profile details, activity timeline, and T-OTP (Time-based One-Time Password) setup. This helps in monitoring user activity, verifying account history, and managing secure authentication configurations.

T-OTP secures access with time-based codes; if missed, users must wait for the next valid code to retry.

🎯 Final Output:

Once a user is added through the User Management form, their profile appears in the records table with key details such as name, email, assigned roles, and status. Admins can take further actions like editing user information, disabling accounts, or viewing activity logs. The Info section provides in-depth visibility into the user's timeline and T-OTP configuration, supporting secure authentication and auditability. This output ensures clear user tracking, role assignment validation, and secure access control across the system.