Skip to main content

User Management

Overview

The User Management system in Cordatus allows organization owners and administrators to manage team members within their organization. This system provides comprehensive control over who can access your organization, what actions they can perform, and how long their access remains valid.


User Roles & Permissions

Role-Based Access Control

Cordatus uses a role-based permission system where access to resources is determined by the roles assigned to each user.

Available Permission Types

Each role can have the following permission levels for different assets:

PermissionDescription
View (GET)Allows viewing/reading data
Create (POST)Allows creating new items
Update (PUT)Allows modifying existing items
Delete (DELETE)Allows removing items

Controllable Assets

Roles can be configured to grant permissions on the following system assets:

Asset CategoryDescription
UsersManage organization members
RolesCreate and manage permission roles
DevicesAccess and control edge devices
CamerasManage IP and physical cameras
JobsControl inference jobs
LicencesView and manage licences
ModelsAccess AI models
PipelinesManage AI pipelines
EnginesControl inference engines
Analytics DashboardView analytics data
Notification ChannelsConfigure alarm channels
SchedulesManage scheduled tasks
Device AlarmsConfigure device alerts
Inference AlarmsSet up AI-based alerts
NetworksManage network configurations
RecordsAccess recorded data
ContainersManage application containers
Private RepositoriesAccess private container registries

Special Role: Superadmin

The superadmin role is a system-protected role with the following characteristics:

  • Cannot be deleted or modified
  • Has full access to all organization resources
  • Automatically assigned to organization owners
  • Cannot be assigned to other users manually

Role Limits

  • Each user can have a maximum of 3 roles assigned simultaneously
  • Roles can have an expiration date after which permissions are automatically revoked

Role Management

Creating a New Role

To create a custom role for your organization:

  1. Navigate to SettingsRoles
  2. Click the "Create Role" button
  3. Enter a Role Name (e.g., "Camera Operator", "Read-Only Viewer")
  4. Configure permissions for each asset:
    • Toggle View, Create, Update, Delete as needed
  5. Click Save

Editing a Role

  1. Find the role in the Roles list
  2. Click the Edit button (pencil icon)
  3. Modify the role name or permissions
  4. Click Save
warning

Changing role permissions affects all users currently assigned to that role immediately.

Deleting a Role

  1. Find the role in the Roles list
  2. Click the Delete button (trash icon)
  3. Confirm the deletion
caution

You cannot delete a role that is currently assigned to users. First remove the role from all users, then delete it.

Best Practices for Role Design

ScenarioRecommended Approach
External contractorsCreate time-limited roles with minimal permissions
Department-specific accessCreate roles per department (e.g., "Security Team", "Operations")
Read-only accessCreate a role with only View permissions
Full managementUse superadmin or create a role with all permissions

User Lifecycle

Creating/Inviting a User

Users are added to an organization through an invitation system:

  1. Navigate to Users Management page
  2. Click the "Invite Member" button
  3. Enter one or more email addresses (press Enter after each email)
  4. Select the role(s) to assign (maximum 3)
  5. Optionally set role expiration:
    • No Limit: Role never expires
    • 7 Days / 30 Days / 90 Days: Auto-expire after selected period
    • Custom: Select a specific date and time
  6. Click Send Invitation
info

The invited user must already have a registered Cordatus account. The invitation link is sent to the user's email, and users must accept the invitation to join the organization.

Accepting an Invitation

When a user receives an invitation:

  1. User receives an email with an invitation link
  2. Clicking the link opens the Cordatus invitation acceptance page
  3. User confirms acceptance
  4. Upon acceptance, the user gains access to the organization with assigned roles

Editing User Roles

To modify a user's assigned roles:

  1. In the Users Management table, locate the user
  2. Click on the Roles column chip to see current roles
  3. Click "Manage Role" button
  4. Select or deselect roles as needed
  5. Adjust role expiration dates if required
  6. Save changes

Activating / Deactivating Users

Users can be temporarily deactivated without removing them from the organization:

To Deactivate:

  1. Find the user in the Users Management table
  2. Click the actions menu (three dots icon)
  3. Select "Deactivate"

To Reactivate:

  1. Find the deactivated user
  2. Click the actions menu
  3. Select "Activate"

Deleting Users

Single User Deletion:

  1. Click the actions menu next to the user
  2. Select "Delete"
  3. Type DELETE (in capitals) to confirm
  4. Click confirm

Bulk User Deletion:

  1. Select multiple users using the checkboxes
  2. Click "Delete Selected" button
  3. Type DELETE to confirm
  4. All selected users will be removed
note

Deleting a user removes them from the organization but does not delete their Cordatus account. They can be re-invited later.


User Statuses

Possible User States

StatusDisplayDescription
ActiveGreen "Active" chipUser has accepted invitation and can access the organization
PendingOrange "Pending" chipUser has been invited but hasn't accepted yet
PassiveGray "Passive" chipUser has been manually deactivated by an administrator
ExpiredRed "Expired" chipUser's invitation or role has expired

Impact of Each Status

StatusCan LoginCan Access OrganizationAppears in Member List
Active
Pending✗ (must accept invite)
Passive
Expired

Role Expiration

Roles can have expiration dates:

  • When a role expires, the user loses permissions granted by that role
  • If all roles expire, the user effectively loses access to the organization
  • Expired roles show as "Expired" in the role list
  • Administrators can extend or remove expiration dates

Limitations & Important Notes

Security Warnings

Important Security Considerations
  1. Share invitation links securely - Invitation links grant access to your organization
  2. Review role permissions carefully - Incorrect role assignments can expose sensitive data
  3. Set appropriate role expirations - Especially for temporary contractors or external users
  4. Regularly audit user access - Remove users who no longer need access
  5. Use strong passwords - Enforce the password policy requirements
  6. Monitor failed login attempts - Excessive failures may indicate unauthorized access attempts