Managing Users in the Secure Endpoint Console
The Secure Endpoint Console allows administrators to add and manage users with different access levels and permissions.
Understanding User Roles
User roles determine which areas of the console a user can access and what actions they can perform.
Depending on the assigned role, users may be able to:
- View devices and reports
- Manage policies and configurations
- Perform device actions
- Manage other users
- Access administrative settings

Available permissions may vary depending on your organization’s configuration and licensing.
Accessing User Management
To manage users:
- Sign in to the Secure Endpoint Console.
- Go to Configurations & Settings.
- Select User Management.

The User Management page displays all existing users associated with your environment.
Inviting a New User
Administrators can invite additional users directly from the console.
To invite a user:
- Go to Configurations & Settings > User Management.
- Select Invite User.
- Enter the user’s email address.
- Assign the appropriate user role and permissions.
- Send the invitation.

The invited user receives an email with instructions to activate their account and create login credentials.
Managing Existing Users
From the User Management page, administrators can:
- Review user details
- Modify user roles and permissions
- Disable or remove user access
- Reset user access when needed

Changes to permissions typically take effect immediately after they are saved.
Troubleshooting User Access Issues
If a user cannot access the console:
- Verify that the invitation was accepted
- Confirm the correct email address was used
- Check that the user account is active
- Ensure the assigned role includes the required permissions

If issues persist, administrators may need to resend the invitation or update the user configuration.
Related Articles
Secure Endpoint Console System Requirements
Before deploying or managing devices with the Secure Endpoint Console, please verify that your environment meets the minimum system requirements for supported platforms, browsers, and network connectivity. Meeting these requirements helps ensure ...
Managing Passwords in the Secure Endpoint Console
The Secure Endpoint Console includes tools that help administrators manage account credentials and device-level security passwords. Resetting Your Console Password If you cannot access the Secure Endpoint Console because you forgot your password, you ...
Secure Endpoint Console Quick Start Guide
The Secure Endpoint Console provides centralized visibility and management for your device fleet through a web-based interface. This guide introduces the main areas of the console and helps you get started with daily navigation and device management ...
Getting Started with the Absolute App
Accessing the Console Open a supported web browser and navigate to the Absolute login portal: https://app.absolute.com. Enter your administrator username and password. Click 'Sign In'. Navigating the Dashboard Upon login, you will be presented with ...
Downloading and Installing the Secure Endpoint Agent
The Secure Endpoint Agent is required for devices to communicate with the Secure Endpoint Console and receive management, visibility, and remediation capabilities. This guide provides an overview of how to download, install, and verify the Secure ...