The User & Role Management section helps you onboard team members, assign the right level of access and control which parts of the platform each user can interact with. This is essential for ensuring security, accountability and role-based workflows within your organization.
Overview
Zecurit supports a role-based access control (RBAC) model, allowing organizations to define who can do what and where. This ensures only authorized users can perform critical operations like configuring settings, enrolling devices or viewing sensitive reports.
The section is divided into two main tabs:
- Users: Manage user invitations, access, and scope
- Roles: Define what each role can do across the platform
Users Tab
Inviting a New User
To add a new user:
- Go to Settings → Organization → Users
- Click on Add User
- Fill out the invitation form:
- User Name – Name of user.
- Email Address – User’s work email
- Photo (Optional) – User’s Photo
- Under Scope:
- Assign Role – Select a default or custom role
- Assign Device Groups – Select which device groups this user can manage
Only Super Admins can invite users and assign roles/groups.
An invitation email will be sent to the user with steps to complete their account setup.
Managing Existing Users
After users accept the invite and join your organization, Super Admins can manage their details by:
- Editing username or profile photo
- Reassigning roles
- Changing device group scope
- Deactivating/reactivating accounts
- Resetting passwords
All changes are audited and logged in the Activity Log for compliance and security tracking.
Roles Tab
Zecurit offers three default roles, and Super Admins can also define custom roles:
Default Roles
| Role | Permissions Summary |
|---|---|
| Super Admin | Full platform access, including user, role, security, and org-wide settings |
| Admin | Can enroll devices, manage inventory, run reports, but cannot modify roles or critical settings |
| Technician | Limited access, can view and manage assigned device groups only, no access to sensitive settings |
Default Role Permissions
Here’s a breakdown of the default access permissions for each role:
| Feature | Super Admin | Admin | Technician |
|---|---|---|---|
| Enrollment | |||
| Deployment | Full | Full | Write |
| Connector | Full | Full | No Access |
| Domain | Full | Full | No Access |
| Enrollment Reports | Full | Full | Write |
| Inventory | |||
| Scan Device | Full | Write | Write |
| Schedule Scan | Full | Full | Read |
| Software License | Full | Write | Read |
| Software Category | Full | Full | Write |
| Geo Location | Full | Write | Read |
| Audit | |||
| Alerts | Full | Full | Write |
| Activity Log | Full | Write | Write |
| Reports & Analytics | |||
| Reports Schedule | Full | Write | Read |
| Security Reports | Full | Full | Write |
| Hardware Reports | Full | Full | Write |
| Software Reports | Full | Full | Write |
| License Reports | Full | Full | Write |
| Certificate Reports | Full | Full | Write |
| User Logon Reports | Full | Full | Write |
| Settings | |||
| User Management | Full | Write | No Access |
| Rebranding | Full | No Access | No Access |
| Roles | Full | Write | Read |
| Groups | Full | Write | Read |
| 2FA Settings | Full | Write | No Access |
| IP Restriction | Full | Write | No Access |
| Session Settings | Full | Write | No Access |
| Agent Protection | Full | Write | No Access |
| Data Cleanup Settings | Full | Write | No Access |
Custom Role Creation
To create a custom role:
- Navigate to Settings → Organization → Roles
- Click Create Role
- Provide a Role Name and optionally a description
- Select feature-level rights/permissions (on/off) for:
For details on module and functionality permissions in Roles, Please check this Custom Role Permissions documentation.
Assigning Device Groups
When assigning a user role, you must also define their device group scope. This limits the user’s visibility and control to only those devices, improving security and simplifying their workflow. A user can be assigned one or more unique groups.
Best Practices
- Always use role-based access instead of sharing accounts
- Periodically review active users and their roles
- Assign minimum necessary permissions based on job function
- Use device group scoping for better segmentation and accountability