Directory › Administration › Users
How to Create a User in CyberVision
Purpose
Create a user account in CyberVision with the correct access scope, security controls, and resource assignments.
Critical Rule
Even when authentication is managed by SAML/SSO, the user must still be created in CyberVision.
Why this is mandatory
SAML validates identity, but CyberVision still needs a local user object to:
- assign role and organization,
- apply account/login restrictions,
- control vault and connection access,
- register user actions in audit logs.
Step-by-step
1) Open Credentials and create user
1. Go to Credentials.
2. Open Create User.
2) Fill account identity fields
In Create User:
- Username
- Password
- Re-enter Password
- Login disabled (optional)
Why?
- Username is the local account identifier.
- Password and confirmation are required for local authentication flows.
Login disabledcan be used to prevent local login when user access should happen only through SAML/SSO.
3) Fill profile fields
In Profile:
- Email address
- Full name
- Organization
- Role
Why?
- Email links identity mapping and notifications.
- Full name improves traceability and operations.
- Organization/Role define authorization scope and business context.
4) Configure user permissions
In Permissions:
- Administrator systems
- Audit system
Why?
- These switches grant elevated capabilities and log visibility.
- Must follow least-privilege principles.
5) Configure MFA/TOTP status (if applicable)
In TOTP Enrollment Status:
- Disable TOTP
- Authentication device confirmed
- Secret key generated
Why?
- Controls MFA enforcement and enrollment state.
- Important for security posture and onboarding consistency.
6) Apply account restrictions
In Account Restrictions:
- Do not allow access after
- Allow access after
- Password expires
- User time zone
- Enable account after
- Disable account after
Why?
- Enforces lifecycle governance (start/end dates, expiry policies, timezone behavior).
7) Apply login restrictions
In Additional Login Restrictions:
- Hosts from which user can log in
- Hosts from which user may not log in
- Hours user is allowed to log in
- Times user is denied from login
Why?
- Reduces attack surface by limiting source and schedule.
8) Assign resources
- Vaults: assign vault membership as needed.
- Connections: assign allowed connections.
- Web: assign allowed web entries.
Why?
- Access is not only identity-based; users also need explicit resource scope.
9) Save
- Click Save.
- Use Cancel to discard changes.
Validation and expected behavior
Required checks
- Password and confirmation must match.
- User appears in the credentials list after saving.
- Role/organization are correct.
- Intended vaults/connections/web resources are assigned.
- Restriction policies are active as configured.
SAML-specific checks
- User exists locally in CyberVision.
- Identity attributes (email/username) match the SAML identity.
- If local login is not allowed, ensure Login disabled is set appropriately.
- User can sign in via SAML and receives the expected authorization scope.
Best practices
- Enforce least privilege for role and permissions.
- Apply account validity windows for contractors/temporary users.
- Restrict login by host/time for sensitive accounts.
- Keep identity attributes consistent between SAML IdP and CyberVision.
- Periodically review users and deprovision inactive accounts.
Was this helpful?
Yes: 0 · No: 0
