IntermediateGetting Started

User Account Management

Comprehensive guide to managing user accounts, permissions, and access controls.

7 min read
Admin Team
Updated 1/13/2025
userspermissionssecurityadministration

User Account Management

Overview

Effective user account management is crucial for maintaining security and ensuring proper access control in your KuhstomDiscovery environment.

User Roles and Permissions

Administrator

Full system access including:

  • User management
  • System configuration
  • Case creation and deletion
  • Billing and subscription management

Case Manager

Case-level permissions:

  • Create and manage cases
  • Assign team members
  • Configure case settings
  • Monitor case progress

Reviewer

Document review permissions:

  • Review assigned documents
  • Apply tags and classifications
  • Participate in collaborative review
  • Access case analytics

Observer

Read-only access:

  • View case information
  • Read documents (if assigned)
  • Monitor review progress
  • Generate reports

Creating User Accounts

Individual Account Creation

  1. Navigate to Settings > Users
  2. Click "Add New User"
  3. Fill in user details:
  4. Configure permissions
  5. Send invitation email

Bulk User Import

For large teams:

  1. Download the user import template
  2. Fill in user information
  3. Upload the CSV file
  4. Review and confirm user list
  5. Send bulk invitations

Managing Existing Users

Updating User Information

  • Edit profile information
  • Change role assignments
  • Update permissions
  • Reset passwords

Deactivating Users

When users leave:

  1. Deactivate the account
  2. Transfer case ownership
  3. Archive user data
  4. Update team assignments

Security Settings

Password Policies

Configure requirements for:

  • Minimum password length
  • Character complexity
  • Password expiration
  • Login attempt limits

Two-Factor Authentication

Enable 2FA for enhanced security:

  1. Go to Security Settings
  2. Enable 2FA requirement
  3. Choose authentication method
  4. Configure backup codes

Session Management

  • Set session timeout periods
  • Configure automatic logout
  • Monitor active sessions
  • Force logout if needed

Access Control

Case-Level Permissions

Control who can:

  • View case information
  • Access documents
  • Modify case settings
  • Delete cases

Document-Level Security

Set restrictions on:

  • Document viewing
  • Download permissions
  • Printing capabilities
  • Sharing options

Audit and Monitoring

User Activity Logs

Track user actions:

  • Login/logout times
  • Document access
  • Case modifications
  • Permission changes

Compliance Reporting

Generate reports for:

  • User access patterns
  • Permission audits
  • Security incidents
  • Compliance requirements

Best Practices

  • Regularly review user permissions
  • Implement principle of least privilege
  • Monitor user activity logs
  • Keep user information up to date
  • Use strong password policies
  • Enable two-factor authentication

Troubleshooting

Common issues and solutions:

  • Login Problems: Check account status and password
  • Permission Errors: Verify role assignments
  • Email Issues: Confirm email settings
  • Sync Problems: Contact system administrator

Was this helpful?