Swift Security Docs
  • Introduction to Swift Security
  • Onboarding
    • Tenant Setup
    • Product Deployments
      • Browser Extension
      • LLM Guardrails
        • LLM Guardrails API Integration
      • VS Code IDE Extension
    • Directory Sync
      • Configuring Google Directory Sync
      • Configuring Microsoft Directory Sync
    • MDM
      • Extension Deployment Via Google Workspace
      • Extension deployment via google workspace + MDM at device level
      • Extension Deployment Via Microsoft Intune
        • Chromium Browsers in Windows
        • Edge Browsers in Windows
        • Firefox Browsers in Windows
      • Extension Deployment Via Kandji
        • Chromium Browsers in Mac
    • Infrastructure
      • SaaS Model
      • Hybrid deployment (coming soon)
  • SSO (Single Sign-On)
    • SSO Configurations identity provider - Google workspace
  • Administrative Guide
    • Console Users
      • Role Creation
      • RBAC General Settings for Login Methods (for the Console)
      • User Creation
      • SSO login(okta)
    • Swift Detection Engines
      • Data Identifiers
        • Custom Data Identifiers
      • EDM Dictionaries
        • EDM Rule
        • EDM Profile
        • EDM Extension Policy
      • Data Rules
        • Custom Rules
      • Data Profiles
      • LLM Guardrail Scanners
        • Data Protection Scanner
        • Gibberish Scanner
        • Ban Substrings Scanner
        • Invisible Text Scanner
        • Code Scanner
        • Language Scanner
        • Sentiment Analysis Scanner
        • Jailbreak Scanner
        • Toxicity Scanner
        • Prompt Injection Scanner
        • Token Limit Scanner
        • Reading Time Scanner
        • Language Same Scanner
        • No Refusal Scanner
        • Factual Consistency Scanner
        • Bias Detection Scanner
        • URL Reachability Scanner
        • Nudity Scanner
        • Gender Scanner
        • Celebrity Scanner
        • Face Scanner
        • Race Scanner
        • Performance and Benchmark
    • Browser Extension
      • Extension Installation
      • Granular Policies
        • Control URL access
        • Protect company data
        • Protect against Threats (Coming Soon)
      • Extension Alerts
      • Extension Events
      • Extension Popups
      • Browser Extension Coverage
    • LLM Guardrails
      • LLM Guardrails Policies
      • LLM Guardrails Alert
      • LLM Guardrails Events
    • Regulation Laws
  • Assets
    • Applications
    • Users
    • Extensions
  • Integration
    • Notification
      • Jira
      • ServiceNow
      • Slack
      • Splunk
    • Forensic
    • Feature
      • Rules Glossary
        • United States
        • Canada
        • Latin America
        • European Union
        • Australia
        • APAC (Asia-Pacific)
        • EMEA Countries
        • Others
      • Data identifiers Glossary
        • United States
        • Canada
        • Latin America
        • European Union
        • Australia
        • APAC (Asia-Pacific)
        • EMEA Countries
        • Others
      • Supported MIME Types
      • Supported OCR Format
    • Manage unauthorized access from unmanaged browser
  • Settings
    • Manage Reasons
    • Audit Log
  • Release Notes
    • Version - 1.27
    • Version - 1.26
    • Version - 1.25
    • Version - 1.24
    • Version - 1.23
    • Version - 1.16
    • Version - 1.15
    • Version - 1.14
    • Version - 1.13
    • Version - 1.12
    • Version - 1.11
    • Version - 1.10
    • Version - 1.09
    • Version - 1.08
    • Version - 1.07
    • Version - 1.06
    • Version - 1.05
    • Version - 1.04
    • Version - 1.03
    • Version - 1.02
    • Version - 1.01
Powered by GitBook
On this page
  1. Administrative Guide
  2. Console Users

User Creation

PreviousRBAC General Settings for Login Methods (for the Console)NextSSO login(okta)

Last updated 3 months ago

When an organization is successfully onboarded and the Tenant Admin, Role is created, the Tenant Admin will proceed to create user for their organization's needs. The following is a professional and structured process for creating a new user:

User Creation Process in Swift Security

Step 1: Access User Management

  1. Log In: The Tenant Admin logs into the Swift Security platform using their credentials.

Step 2: Navigate to Settings

  1. Main Menu: Access the main menu and select "Settings."

Step 3: Configure RBAC Settings

  1. Select RBAC: Within the Settings menu, locate and select the "RBAC" (Role-Based Access Control) option.

  2. User Tab: Once in the RBAC section, click on the "User" tab.

Step 4: Create a New User

New user Button: On the right side of the user section, click the button labeled "NEW USER" to initiate the process of creating a new user.

Input User Details:

  • First Name: Enter the first name of the new user.

  • Last Name: Enter the last name of the new user.

  • User Email: Input the email address of the user. This will be used for login.

  • Password: Create a secure password for the user. This password will be used for their initial login and can be changed later.

  • Confirm Password: Re-enter the password to ensure accuracy.

Assign User Role:

  • Role: Select the appropriate role for the user based on the organization's needs. These roles determine the user's access levels and permissions within the platform.

Review and Save:

  • Review all the entered information to ensure accuracy and completeness.

  • Click "Save" to create the new user account.

Once the user is created, ensure it appears in the list of user.

The new user will receive an email notification containing a link to login their account.

To edit or delete a role within the RBAC settings, please follow these detailed instructions:

Editing a User

Choose the User to Edit:

  1. Find the user you wish to edit from the list.

  2. Click on the three vertical dots (also known as the action menu) next to the user you want to modify.

Edit the User:

  1. Select the "Edit" option from the action menu.

  2. Update the necessary details in the user such as the First Name, Last Name, Mobile Number or Role.

Save the Changes:

  1. After making the required changes, click the "Save" button to apply the updates to the user.

Deleting a User

Choose the User to Delete:

  1. Find the user you wish to delete from the list.

  2. Click on the three vertical dots (action menu) next to the user you want to remove.

Delete the User:

  1. Select the "Delete" option from the action menu.

  2. A confirmation pop-up will appear. Review the details to ensure you are deleting the correct user.

Confirm the Deletion:

  1. Click the "Confirm" button in the pop-up to permanently delete the user.