Users

Use System Administration > System Admin > Security Setup to create, delete, enable, disable, and modify user accounts.

Monitoring user access is a common security requirement for IT departments. IEE provides secure, centralized monitoring of IEE Rich Client user access through a combination of log files, audit tables, and MSMQ events.

User access monitoring allows you to identify who is successfully accessing the IEE Rich Client, who has changed their login profile, and who attempted but failed to access the IEE Rich Client.

For more information, see User access log events in IEE.

Important! The Users and Roles screens will be disabled when Identity Sync is installed. The Identity Sync service in the Cloud Identity portal manages user roles and permissions. For more information, refer to the Identity Sync Service User Guide.

Related topics: