User Management & Permissions
On this page
Overview
Ademero provides comprehensive user management and permission controls to ensure secure access to your documents and workflows.
Key Concepts
Understanding users, groups, roles, and permissions is essential for proper system administration.
Security Model
Ademero uses role-based access control (RBAC) with granular permissions at the folder, document, and field levels.
Managing Users
Add, edit, and manage user accounts in your organization.
- Navigate to Settings > User Management
- Click "Add New User" button
- Enter user details (name, email, department)
- Assign initial role and permissions
- Send invitation email to user
User Profiles
Each user profile contains contact information, role assignments, group memberships, and activity history.
// User profile structure
{
"userId": "USR-12345","email": "user@company.com","name": "John Doe","role": "Manager","groups": ["Finance", "Approvers"],"permissions": ["read", "write", "approve"],"lastLogin": "2024-01-15T10:30:00Z"
}
Bulk User Import
Import multiple users via CSV file or sync with Active Directory/LDAP for enterprise deployments.
Roles and Permissions
Configure roles with specific permission sets for different user types.
Default Roles
Ademero includes pre-configured roles: Administrator, Manager, User, and Viewer. Each can be customized.
Role | Permissions | Use Case |
---|---|---|
Administrator | Full system access | IT admins, system managers |
Manager | Read, write, approve, delegate | Department heads, supervisors |
User | Read, write, upload | Regular employees |
Viewer | Read only | Auditors, external users |
Custom Roles
Create custom roles tailored to your organization's specific needs with granular permission controls.
Permission Types
Available permissions include: View, Download, Upload, Edit, Delete, Share, Approve, and Administer.
Groups Management
Organize users into groups for easier permission management.
Creating Groups
Groups allow you to manage permissions for multiple users simultaneously. Common groups include departments, project teams, and approval committees.
Group Hierarchy
Groups can be nested to create hierarchical permission structures that mirror your organization.
Security Best Practices
Follow these guidelines to maintain system security:
- Implement principle of least privilege
- Regular permission audits
- Enable two-factor authentication
- Set password complexity requirements
- Configure session timeouts
- Monitor user activity logs
- Remove inactive users promptly
Single Sign-On (SSO)
Configure SSO integration for seamless authentication.
Supported Providers
Ademero supports SAML 2.0, OAuth 2.0, and OpenID Connect protocols. Compatible with Azure AD, Google Workspace, Okta, and more.
Configuration Steps
Set up SSO by configuring identity provider settings, mapping user attributes, and testing the connection.