assets/img/logo.svg
Admin

Users

Create and manage users, roles, access zones and authentication credentials

The Users page allows you to:

  • create and edit users
  • assign roles and access zones
  • manage login credentials (multiple per user)
  • manage the user’s Two-Factor Authentication (2FA)
The Sessions and Activity tabs are visible in the interface but are not implemented yet.

Quick start

  1. Click Add to create a new user
  2. Enter the user’s basic information
  3. Assign Role and Zones
  4. Configure the Credentials (login method)

Users list

Users are displayed as cards. Each card shows the main information:

  • Username
  • First and Last name
  • Status (e.g. Active, Disabled, Blocked): indicates whether the user can access the system.
    • Active: the user is enabled and can log in.
    • Disabled: the user is disabled and cannot log in.
    • Blocked: the user is blocked for security reasons or by an administrator’s decision.
      This status is used to temporarily prevent access, for example after suspicious activity or an administrative action.
Automatic blocking mechanisms (for example after too many failed login attempts) are not implemented yet.
Currently, the Blocked status is applied only through administrative actions.
  • Assigned Role
  • Enabled Zones
  • E-mail
  • Account expiration date (Expires), if configured
  • Associated Identity provider (e.g. VireoXcube)

Clicking on a user card opens the user details, where (if authorized) you can edit profile and security settings.


Search and filters

At the top of the page you can quickly find users and narrow down the list:

  • Search: Filter users…
  • Status filters: Active, Blocked, Disabled
  • Zone filter: Filter by zones
  • Role filter: Filter by roles
  • Status or alphabetical order: Status order button. By severity: Blocked, Active, Disabled
If you cannot find a user, check whether filters are excluding them (for example Disabled).

Create a new user

User creation is a guided process in 3 steps.

Step 1 of 3 — User Information

Enter the basic data:

  • Username (required)
  • First name
  • Last name
  • Phone
  • E-mail

Click Next to continue.

Step 2 of 3 — Profile

Configure permissions and access scope:

  • Role (required)
  • Zones (required)
Roles and zones define what the user can see and which plants or areas they can manage.

Click Next to continue.

Step 3 of 3 — Credentials

Configure the login credentials (required):

  • Name Credentials (e.g. Default)
  • Name Provider (Identity Provider, e.g. VireoXcube)
  • Additional fields depending on the provider, for example for an Internal Identity Provider:
    • Password
    • Repeat Password
For the Internal Identity Provider, the password is validated according to the security policies defined by the system administrator (minimum length, complexity, etc.) on the Identity Provider.
Nothing is shown for an LDAP Identity Provider, since credential management is handled externally.

Click Add to complete the creation.


User details

Opening a user shows a set of tabs.

Tab: Profile

Contains:

  • Personal information (Username, First name, Last name, Phone, Email)
  • Account profiling (Role and Zones)
  • Preferences (Language, Appearance, Timezone, Date format)

To edit a block of information, use the edit (pencil) icon in that section.

Available action:

  • Delete: permanently deletes the user (irreversible)
For security and auditability reasons, some users may not be deletable.
If a user has already performed operations in the system (such as commands, alarm acknowledgements, or other actions), the system must keep the related logs.
In these cases, instead of being permanently deleted, the user is automatically disabled, preventing access while preserving the activity history.

Security and credentials

Tab: Security

This tab includes:

  • Two-Factor Authentication (2FA) status
  • the list of configured Credentials
  • management actions (reset, add, delete)

Two-Factor Authentication (2FA)

2FA is user-wide (not per credential).
If a user has multiple credentials, they all share the same 2FA.

Available action:

  • Reset 2FA: resets the user’s 2FA

After a 2FA reset:

  • the user must set up 2FA again at the next login
  • the QR code will be shown again during the setup process

Credentials (login methods)

A user can have one or more credentials. Each credential is linked to an Identity Provider.

Typical actions on a credential:

  • Reset Password: resets the password for that credential
  • Delete: removes the credential
Important: Reset Password affects the selected credential only.
Reset 2FA affects the user, regardless of which credential is used to log in.

Credential priority

When a user has multiple credentials, they are ordered by priority. The credential with the lowest priority number appears first in the list.

When you add a new credential, it is automatically assigned a priority lower than all existing credentials (making it the first in the list).

The priority determines the order in which credentials are displayed, but does not affect which credential the user chooses to log in with.

Add new credentials

Use Add new credentials to add another login method for the same user.

Required fields:

  • Name Credentials
  • Name Provider
  • Password
  • Repeat Password

Use this when:

  • you want to allow login through a different provider
  • you want to add additional credentials for the same user

Account expiration

Users can have an optional expiration date set on their account. When an account expires:

  • The user can no longer log in to the system
  • The account is automatically treated as disabled

To set an expiration date:

  1. Open the user's profile
  2. Edit the account section
  3. Set the Expires date
Account expiration is useful for temporary access, such as contractors or consultants who need access for a limited period.

User status

Users can have one of the following statuses:

StatusDescription
ActiveUser is enabled and can log in
DisabledUser is disabled and cannot log in
BlockedUser is blocked for security reasons or by administrator decision
The Blocked status is currently applied only through administrative actions. Automatic blocking mechanisms (e.g., after too many failed login attempts) are not implemented yet.

Frequently asked questions

Can a user have multiple credentials?

Yes. A single user can have multiple credentials, each linked to an Identity Provider.

Does 2FA apply to all credentials?

Yes. 2FA is shared across all of the user's credentials.

What is the difference between "Reset Password" and "Reset 2FA"?

  • Reset Password changes the password of the selected credential
  • Reset 2FA resets the user's 2FA (they must set it up again at the next login)

Why do I see nothing in "Sessions" or "Activity"?

Because those tabs are not implemented yet.

What happens when a user account expires?

When the expiration date is reached, the user can no longer log in. The account is treated as disabled but can be reactivated by an administrator by extending or removing the expiration date.

What is the credential priority for?

The priority determines the display order of credentials in the Security tab. It does not affect which credential the user uses to log in.