LogoLogo
HomepageSign Up
  • Security
  • Security Architecture
  • Privacy Policy
  • Security Organization
  • policies
    • Access Control
    • Change Management
    • Incident Management
    • Monitoring
    • Network and Systems
    • People Security
    • Risk Management
    • Vendor Management
    • Vulnerability Management
    • Subprocessors
    • Data Processed
  • End User Access
    • User Access Management
    • Recordings Security
  • resources
    • Service Level Agreement
    • MNDA
    • Privacy Policy
    • Terms of Service
    • Data Processing Addendum
Powered by GitBook
On this page
  • User Access Management Guide
  • Overview
  • Organization Structure
  • User Roles and Permissions
  • Authentication Methods
  • Best Practices for User Management
Export as PDF
  1. End User Access

User Access Management

User Access Management Guide

Overview

This guide outlines the user management and authentication framework for Screendesk organizations, including roles, permissions, and authentication methods.

Organization Structure

  • All users belong to an organization

  • Access to features is determined by user roles

  • User management is controlled by Owners and Admins

User Roles and Permissions

Owner & Admin

  • Full administrative access to the organization

  • Can manage billing and subscription settings

  • Can modify organization-wide settings

  • Can manage user roles and permissions

  • Can configure authentication methods

Editor

  • Cannot access billing or organization settings

  • Cannot modify user roles or permissions

  • Has access to manage all recordings within the organization

Member

  • Basic user role

  • Can manage only their own recordings

  • Cannot access organization settings

  • Cannot access other users' recordings

Authentication Methods

SAML SSO 2.0

  • Enterprise-grade Single Sign-On

  • Integrates with existing identity providers

  • Supports automated user provisioning

  • When enabled, becomes the primary authentication method

  • Important: When SAML is enabled, only the organization owner can continue using email/password login

SCIM

  • Automated user provisioning and deprovisioning

  • Synchronizes user attributes with identity provider

  • Streamlines user lifecycle management

  • Supports real-time user updates

Email/Password + MFA

  • Traditional authentication method

  • Requires email verification

  • Multi-Factor Authentication (MFA) required for additional security

  • Available to all users when SAML is not enabled

  • Only available to organization owner when SAML is enabled

Best Practices for User Management

  1. Enable SAML SSO for enterprise organizations

  2. Implement SCIM for automated user management

  3. Regularly audit user roles and permissions

  4. Ensure MFA is enabled for all email/password accounts

  5. Document role assignments within your organization

  6. Regularly review access logs and user activities

  7. Remove inactive users promptly

PreviousData ProcessedNextRecordings Security

Last updated 6 months ago