Managing Users in the Secure Endpoint Console

Managing Users in the Secure Endpoint Console

The Secure Endpoint Console allows administrators to add and manage users with different access levels and permissions.

Understanding User Roles

User roles determine which areas of the console a user can access and what actions they can perform.
Depending on the assigned role, users may be able to:
  1. View devices and reports 
  2. Manage policies and configurations 
  3. Perform device actions 
  4. Manage other users 
  5. Access administrative settings 
Info
Available permissions may vary depending on your organization’s configuration and licensing.

Accessing User Management

To manage users:
  1. Sign in to the Secure Endpoint Console. 
  2. Go to Configurations & Settings. 
  3. Select User Management. 
Notes
The User Management page displays all existing users associated with your environment.

Inviting a New User

Administrators can invite additional users directly from the console.

To invite a user:
  1. Go to Configurations & Settings > User Management. 
  2. Select Invite User. 
  3. Enter the user’s email address. 
  4. Assign the appropriate user role and permissions. 
  5. Send the invitation. 
Notes
The invited user receives an email with instructions to activate their account and create login credentials.

Managing Existing Users

From the User Management page, administrators can:
  1. Review user details 
  2. Modify user roles and permissions 
  3. Disable or remove user access 
  4. Reset user access when needed 
Notes
Changes to permissions typically take effect immediately after they are saved.

Troubleshooting User Access Issues

If a user cannot access the console:
  1. Verify that the invitation was accepted 
  2. Confirm the correct email address was used 
  3. Check that the user account is active 
  4. Ensure the assigned role includes the required permissions 
Alert
If issues persist, administrators may need to resend the invitation or update the user configuration.
    • Related Articles

    • Secure Endpoint Console System Requirements

      Before deploying or managing devices with the Secure Endpoint Console, please verify that your environment meets the minimum system requirements for supported platforms, browsers, and network connectivity. Meeting these requirements helps ensure ...
    • Managing Passwords in the Secure Endpoint Console

      The Secure Endpoint Console includes tools that help administrators manage account credentials and device-level security passwords. Resetting Your Console Password If you cannot access the Secure Endpoint Console because you forgot your password, you ...
    • Secure Endpoint Console Quick Start Guide

      The Secure Endpoint Console provides centralized visibility and management for your device fleet through a web-based interface. This guide introduces the main areas of the console and helps you get started with daily navigation and device management ...
    • Getting Started with the Absolute App

      Accessing the Console Open a supported web browser and navigate to the Absolute login portal: https://app.absolute.com. Enter your administrator username and password. Click 'Sign In'. Navigating the Dashboard Upon login, you will be presented with ...
    • Downloading and Installing the Secure Endpoint Agent

      The Secure Endpoint Agent is required for devices to communicate with the Secure Endpoint Console and receive management, visibility, and remediation capabilities. This guide provides an overview of how to download, install, and verify the Secure ...